builder: mozilla-beta_xp_ix-debug_test-web-platform-tests-2 slave: t-xp32-ix-056 starttime: 1483614427.69 results: success (0) buildid: 20170105012540 builduid: 8d06091bdfe641d38dc19589f60324f2 revision: 9a604441509654bd2bddc031545f4c7ae1787bd7 ========= Started set props: master (results: 0, elapsed: 0 secs) (at 2017-01-05 03:07:07.689364) ========= master: http://buildbot-master112.bb.releng.scl3.mozilla.com:8201/ ========= Finished set props: master (results: 0, elapsed: 0 secs) (at 2017-01-05 03:07:07.689883) ========= ========= Started downloading to buildprops.json (results: 0, elapsed: 0 secs) (at 2017-01-05 03:07:07.690172) ========= ========= Finished downloading to buildprops.json (results: 0, elapsed: 0 secs) (at 2017-01-05 03:07:07.801412) ========= ========= Started 'bash -c ...' (results: 0, elapsed: 0 secs) (at 2017-01-05 03:07:07.801826) ========= 'bash' '-c' 'wget -Oarchiver_client.py --no-check-certificate --tries=10 --waitretry=3 https://hg.mozilla.org/build/tools/raw-file/default/buildfarm/utils/archiver_client.py' in dir C:\slave\test\. (timeout 1200 secs) watching logfiles {} argv: ['bash', '-c', 'wget -Oarchiver_client.py --no-check-certificate --tries=10 --waitretry=3 https://hg.mozilla.org/build/tools/raw-file/default/buildfarm/utils/archiver_client.py'] environment: ALLUSERSPROFILE=C:\Documents and Settings\All Users APPDATA=C:\Documents and Settings\cltbld.T-XP32-IX-056\Application Data COMMONPROGRAMFILES=C:\Program Files\Common Files COMPUTERNAME=T-XP32-IX-056 COMSPEC=C:\WINDOWS\system32\cmd.exe DCLOCATION=SCL3 DNSSUFFIX=wintest.releng.scl3.mozilla.com FP_NO_HOST_CHECK=NO HOMEDRIVE=C: HOMEPATH=\Documents and Settings\cltbld.T-XP32-IX-056 KTS_HOME=C:\Program Files\KTS KTS_VERSION=1.19c LOGONSERVER=\\T-XP32-IX-056 MONDIR=C:\Monitor_config\ MOZBUILDDIR=C:\mozilla-build\ NUMBER_OF_PROCESSORS=8 OS=Windows_NT OURDRIVE=C: PATH=C:\Program Files\NVIDIA Corporation\PhysX\Common;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\system32\WindowsPowerShell\v1.0;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;C:\mozilla-build\hg PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1 PROCESSOR_ARCHITECTURE=x86 PROCESSOR_IDENTIFIER=x86 Family 6 Model 30 Stepping 5, GenuineIntel PROCESSOR_LEVEL=6 PROCESSOR_REVISION=1e05 PROGRAMFILES=C:\Program Files PROMPT=$P$G PWD=C:\slave\test RUNLOGFILE=C:\slave\\runslave.log SESSIONNAME=Console SLAVEDIR=C:\slave\ SYSTEMDRIVE=C: SYSTEMROOT=C:\WINDOWS TEMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp TEST1=testie TMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp USERDOMAIN=T-XP32-IX-056 USERNAME=cltbld USERPROFILE=C:\Documents and Settings\cltbld.T-XP32-IX-056 WINDIR=C:\WINDOWS using PTY: False --03:07:37-- https://hg.mozilla.org/build/tools/raw-file/default/buildfarm/utils/archiver_client.py => `archiver_client.py' Resolving hg.mozilla.org... 63.245.215.25, 63.245.215.102 Connecting to hg.mozilla.org|63.245.215.25|:443... connected. WARNING: Certificate verification error for hg.mozilla.org: certificate signature failure HTTP request sent, awaiting response... 200 Script output follows Length: 12,179 (12K) [text/x-python] 0K .......... . 100% 2.03 GB/s 03:07:37 (2.03 GB/s) - `archiver_client.py' saved [12179/12179] program finished with exit code 0 elapsedTime=0.593000 ========= master_lag: 0.38 ========= ========= Finished 'bash -c ...' (results: 0, elapsed: 0 secs) (at 2017-01-05 03:07:08.772632) ========= ========= Started 'rm -rf ...' (results: 0, elapsed: 0 secs) (at 2017-01-05 03:07:08.772978) ========= 'rm' '-rf' 'scripts' 'properties' in dir C:\slave\test\. (timeout 1200 secs) watching logfiles {} argv: ['rm', '-rf', 'scripts', 'properties'] environment: ALLUSERSPROFILE=C:\Documents and Settings\All Users APPDATA=C:\Documents and Settings\cltbld.T-XP32-IX-056\Application Data COMMONPROGRAMFILES=C:\Program Files\Common Files COMPUTERNAME=T-XP32-IX-056 COMSPEC=C:\WINDOWS\system32\cmd.exe DCLOCATION=SCL3 DNSSUFFIX=wintest.releng.scl3.mozilla.com FP_NO_HOST_CHECK=NO HOMEDRIVE=C: HOMEPATH=\Documents and Settings\cltbld.T-XP32-IX-056 KTS_HOME=C:\Program Files\KTS KTS_VERSION=1.19c LOGONSERVER=\\T-XP32-IX-056 MONDIR=C:\Monitor_config\ MOZBUILDDIR=C:\mozilla-build\ NUMBER_OF_PROCESSORS=8 OS=Windows_NT OURDRIVE=C: PATH=C:\Program Files\NVIDIA Corporation\PhysX\Common;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\system32\WindowsPowerShell\v1.0;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;C:\mozilla-build\hg PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1 PROCESSOR_ARCHITECTURE=x86 PROCESSOR_IDENTIFIER=x86 Family 6 Model 30 Stepping 5, GenuineIntel PROCESSOR_LEVEL=6 PROCESSOR_REVISION=1e05 PROGRAMFILES=C:\Program Files PROMPT=$P$G PWD=C:\slave\test RUNLOGFILE=C:\slave\\runslave.log SESSIONNAME=Console SLAVEDIR=C:\slave\ SYSTEMDRIVE=C: SYSTEMROOT=C:\WINDOWS TEMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp TEST1=testie TMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp USERDOMAIN=T-XP32-IX-056 USERNAME=cltbld USERPROFILE=C:\Documents and Settings\cltbld.T-XP32-IX-056 WINDIR=C:\WINDOWS using PTY: False program finished with exit code 0 elapsedTime=0.691000 ========= master_lag: 0.07 ========= ========= Finished 'rm -rf ...' (results: 0, elapsed: 0 secs) (at 2017-01-05 03:07:09.535402) ========= ========= Started 'bash -c ...' (results: 0, elapsed: 2 secs) (at 2017-01-05 03:07:09.535790) ========= 'bash' '-c' u'python archiver_client.py mozharness --repo releases/mozilla-beta --rev 9a604441509654bd2bddc031545f4c7ae1787bd7 --destination scripts --debug' in dir C:\slave\test\. (timeout 1200 secs) watching logfiles {} argv: ['bash', '-c', u'python archiver_client.py mozharness --repo releases/mozilla-beta --rev 9a604441509654bd2bddc031545f4c7ae1787bd7 --destination scripts --debug'] environment: ALLUSERSPROFILE=C:\Documents and Settings\All Users APPDATA=C:\Documents and Settings\cltbld.T-XP32-IX-056\Application Data COMMONPROGRAMFILES=C:\Program Files\Common Files COMPUTERNAME=T-XP32-IX-056 COMSPEC=C:\WINDOWS\system32\cmd.exe DCLOCATION=SCL3 DNSSUFFIX=wintest.releng.scl3.mozilla.com FP_NO_HOST_CHECK=NO HOMEDRIVE=C: HOMEPATH=\Documents and Settings\cltbld.T-XP32-IX-056 KTS_HOME=C:\Program Files\KTS KTS_VERSION=1.19c LOGONSERVER=\\T-XP32-IX-056 MONDIR=C:\Monitor_config\ MOZBUILDDIR=C:\mozilla-build\ NUMBER_OF_PROCESSORS=8 OS=Windows_NT OURDRIVE=C: PATH=C:\Program Files\NVIDIA Corporation\PhysX\Common;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\system32\WindowsPowerShell\v1.0;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;C:\mozilla-build\hg PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1 PROCESSOR_ARCHITECTURE=x86 PROCESSOR_IDENTIFIER=x86 Family 6 Model 30 Stepping 5, GenuineIntel PROCESSOR_LEVEL=6 PROCESSOR_REVISION=1e05 PROGRAMFILES=C:\Program Files PROMPT=$P$G PWD=C:\slave\test RUNLOGFILE=C:\slave\\runslave.log SESSIONNAME=Console SLAVEDIR=C:\slave\ SYSTEMDRIVE=C: SYSTEMROOT=C:\WINDOWS TEMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp TEST1=testie TMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp USERDOMAIN=T-XP32-IX-056 USERNAME=cltbld USERPROFILE=C:\Documents and Settings\cltbld.T-XP32-IX-056 WINDIR=C:\WINDOWS using PTY: False 2017-01-05 03:07:38,792 truncating revision to first 12 chars 2017-01-05 03:07:38,792 Setting DEBUG logging. 2017-01-05 03:07:38,792 attempt 1/10 2017-01-05 03:07:38,792 Getting archive location from https://api.pub.build.mozilla.org/archiver/hgmo/releases/mozilla-beta/9a6044415096?&preferred_region=us-west-2&suffix=tar.gz&subdir=testing/mozharness 2017-01-05 03:07:39,835 unpacking tar archive at: mozilla-beta-9a6044415096/testing/mozharness/ 2017-01-05 03:07:39,934 skipping symlink on windows: configs/single_locale/linux32.py program finished with exit code 0 elapsedTime=1.848000 ========= master_lag: 0.26 ========= ========= Finished 'bash -c ...' (results: 0, elapsed: 2 secs) (at 2017-01-05 03:07:11.644439) ========= ========= Started set props: script_repo_revision (results: 0, elapsed: 0 secs) (at 2017-01-05 03:07:11.644782) ========= script_repo_revision: 9a604441509654bd2bddc031545f4c7ae1787bd7 ========= Finished set props: script_repo_revision (results: 0, elapsed: 0 secs) (at 2017-01-05 03:07:11.645188) ========= ========= Started downloading to oauth.txt (results: 0, elapsed: 0 secs) (at 2017-01-05 03:07:11.645463) ========= ========= Finished downloading to oauth.txt (results: 0, elapsed: 0 secs) (at 2017-01-05 03:07:11.654953) ========= ========= Started 'c:/mozilla-build/python27/python -u ...' (results: 0, elapsed: 35 mins, 43 secs) (at 2017-01-05 03:07:11.655229) ========= 'c:/mozilla-build/python27/python' '-u' 'scripts/scripts/web_platform_tests.py' '--cfg' 'web_platform_tests/prod_config_windows.py' '--test-type=testharness' '--total-chunks' '10' '--this-chunk' '2' '--blob-upload-branch' 'mozilla-beta' '--download-symbols' 'true' in dir C:\slave\test\. (timeout 1800 secs) (maxTime 7200 secs) watching logfiles {} argv: ['c:/mozilla-build/python27/python', '-u', 'scripts/scripts/web_platform_tests.py', '--cfg', 'web_platform_tests/prod_config_windows.py', '--test-type=testharness', '--total-chunks', '10', '--this-chunk', '2', '--blob-upload-branch', 'mozilla-beta', '--download-symbols', 'true'] environment: ALLUSERSPROFILE=C:\Documents and Settings\All Users APPDATA=C:\Documents and Settings\cltbld.T-XP32-IX-056\Application Data COMMONPROGRAMFILES=C:\Program Files\Common Files COMPUTERNAME=T-XP32-IX-056 COMSPEC=C:\WINDOWS\system32\cmd.exe DCLOCATION=SCL3 DNSSUFFIX=wintest.releng.scl3.mozilla.com DevEnvDir=D:\msvs8\Common7\IDE FP_NO_HOST_CHECK=NO FrameworkDir=C:\WINDOWS\Microsoft.NET\Framework FrameworkSDKDir=D:\msvs8\SDK\v2.0 FrameworkVersion=v2.0.50727 HOMEDRIVE=C: HOMEPATH=\Documents and Settings\cltbld.T-XP32-IX-056 KTS_HOME=C:\Program Files\KTS KTS_VERSION=1.19c LIBPATH=C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727;D:\msvs8\VC\ATLMFC\LIB LOGONSERVER=\\T-XP32-IX-056 MONDIR=C:\Monitor_config\ MOZBUILDDIR=C:\mozilla-build\ MOZILLABUILD=D:\mozilla-build MOZILLABUILDDRIVE=C: MOZILLABUILDPATH=\mozilla-build\ MOZ_AIRBAG=1 MOZ_CRASHREPORTER_NO_REPORT=1 MOZ_HIDE_RESULTS_TABLE=1 MOZ_MSVCVERSION=8 MOZ_NO_REMOTE=1 MOZ_TOOLS=D:\mozilla-build\moztools MSVCDir=D:\msvs8\VC NO_EM_RESTART=1 NO_FAIL_ON_TEST_ERRORS=1 NUMBER_OF_PROCESSORS=8 OS=Windows_NT OURDRIVE=C: PATH=C:\Program Files\NVIDIA Corporation\PhysX\Common;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\system32\WindowsPowerShell\v1.0;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;C:\mozilla-build\hg PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1 PROCESSOR_ARCHITECTURE=x86 PROCESSOR_IDENTIFIER=x86 Family 6 Model 30 Stepping 5, GenuineIntel PROCESSOR_LEVEL=6 PROCESSOR_REVISION=1e05 PROGRAMFILES=C:\Program Files PROMPT=$P$G PROPERTIES_FILE=C:\slave\test/buildprops.json PWD=C:\slave\test RUNLOGFILE=C:\slave\\runslave.log SESSIONNAME=Console SLAVEDIR=C:\slave\ SYSTEMDRIVE=C: SYSTEMROOT=C:\WINDOWS TEMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp TEST1=testie TMP=C:\DOCUME~1\CLTBLD~1.T-X\LOCALS~1\Temp USERDOMAIN=T-XP32-IX-056 USERNAME=cltbld USERPROFILE=C:\Documents and Settings\cltbld.T-XP32-IX-056 VCINSTALLDIR=D:\msvs8\VC VCVARS=D:\msvs8\VC\bin\vcvars32.bat VSINSTALLDIR=D:\msvs8 WINDIR=C:\WINDOWS XPCOM_DEBUG_BREAK=warn using PTY: False 03:07:40 INFO - MultiFileLogger online at 20170105 03:07:40 in C:\slave\test 03:07:40 INFO - Run as scripts/scripts/web_platform_tests.py --cfg web_platform_tests/prod_config_windows.py --test-type=testharness --total-chunks 10 --this-chunk 2 --blob-upload-branch mozilla-beta --download-symbols true 03:07:40 INFO - Dumping config to C:\slave\test\logs\localconfig.json. 03:07:40 INFO - {'allow_software_gl_layers': False, 03:07:40 INFO - 'append_to_log': False, 03:07:40 INFO - 'base_work_dir': 'C:\\slave\\test', 03:07:40 INFO - 'blob_upload_branch': 'mozilla-beta', 03:07:40 INFO - 'blob_uploader_auth_file': 'C:\\slave\\test\\oauth.txt', 03:07:40 INFO - 'buildbot_json_path': 'buildprops.json', 03:07:40 INFO - 'config_files': ('web_platform_tests/prod_config_windows.py',), 03:07:40 INFO - 'default_blob_upload_servers': ('https://blobupload.elasticbeanstalk.com',), 03:07:40 INFO - 'download_minidump_stackwalk': True, 03:07:40 INFO - 'download_symbols': 'true', 03:07:40 INFO - 'e10s': False, 03:07:40 INFO - 'exes': {'hg': 'c:/mozilla-build/hg/hg', 03:07:40 INFO - 'mozinstall': ('C:\\slave\\test/build/venv/scripts/python', 03:07:40 INFO - 'C:\\slave\\test/build/venv/scripts/mozinstall-script.py'), 03:07:40 INFO - 'python': 'c:\\mozilla-build\\python27\\python.exe', 03:07:40 INFO - 'tooltool.py': ('c:\\mozilla-build\\python27\\python.exe', 03:07:40 INFO - 'C:/mozilla-build/tooltool.py'), 03:07:40 INFO - 'virtualenv': ('c:\\mozilla-build\\python27\\python.exe', 03:07:40 INFO - 'c:/mozilla-build/buildbotve/virtualenv.py')}, 03:07:40 INFO - 'find_links': ('http://pypi.pvt.build.mozilla.org/pub', 03:07:40 INFO - 'http://pypi.pub.build.mozilla.org/pub'), 03:07:40 INFO - 'log_level': 'info', 03:07:40 INFO - 'log_to_console': True, 03:07:40 INFO - 'opt_config_files': (), 03:07:40 INFO - 'options': ('--prefs-root=%(test_path)s/prefs', 03:07:40 INFO - '--processes=1', 03:07:40 INFO - '--config=%(test_path)s/wptrunner.ini', 03:07:40 INFO - '--ca-cert-path=%(test_path)s/certs/cacert.pem', 03:07:40 INFO - '--host-key-path=%(test_path)s/certs/web-platform.test.key', 03:07:40 INFO - '--host-cert-path=%(test_path)s/certs/web-platform.test.pem', 03:07:40 INFO - '--certutil-binary=%(test_install_path)s/bin/certutil'), 03:07:40 INFO - 'pip_index': False, 03:07:40 INFO - 'require_test_zip': True, 03:07:40 INFO - 'test_type': ('testharness',), 03:07:40 INFO - 'this_chunk': '2', 03:07:40 INFO - 'total_chunks': '10', 03:07:40 INFO - 'virtualenv_path': 'venv', 03:07:40 INFO - 'volatile_config': {'actions': None, 'add_actions': None, 'no_actions': None}, 03:07:40 INFO - 'work_dir': 'build'} 03:07:40 INFO - [mozharness: 2017-01-05 11:07:40.795000Z] Running clobber step. 03:07:40 INFO - Running pre-action listener: _resource_record_pre_action 03:07:40 INFO - Running main action method: clobber 03:07:40 INFO - rmtree: C:\slave\test\build 03:07:40 INFO - Using _rmtree_windows ... 03:07:40 INFO - retry: Calling _rmtree_windows with args: ('C:\\slave\\test\\build',), kwargs: {}, attempt #1 03:08:20 INFO - Running post-action listener: _resource_record_post_action 03:08:20 INFO - [mozharness: 2017-01-05 11:08:20.377000Z] Finished clobber step (success) 03:08:20 INFO - [mozharness: 2017-01-05 11:08:20.377000Z] Running read-buildbot-config step. 03:08:20 INFO - Running pre-action listener: _resource_record_pre_action 03:08:20 INFO - Running main action method: read_buildbot_config 03:08:20 INFO - Using buildbot properties: 03:08:20 INFO - { 03:08:20 INFO - "project": "", 03:08:20 INFO - "product": "firefox", 03:08:20 INFO - "script_repo_revision": "production", 03:08:20 INFO - "scheduler": "tests-mozilla-beta-xp_ix-debug-unittest", 03:08:20 INFO - "repository": "", 03:08:20 INFO - "buildername": "Windows XP 32-bit mozilla-beta debug test web-platform-tests-2", 03:08:20 INFO - "buildid": "20170105012540", 03:08:20 INFO - "pgo_build": "False", 03:08:20 INFO - "basedir": "C:\\slave\\test", 03:08:20 INFO - "buildnumber": 11, 03:08:20 INFO - "slavename": "t-xp32-ix-056", 03:08:20 INFO - "revision": "9a604441509654bd2bddc031545f4c7ae1787bd7", 03:08:20 INFO - "master": "http://buildbot-master112.bb.releng.scl3.mozilla.com:8201/", 03:08:20 INFO - "platform": "win32", 03:08:20 INFO - "branch": "mozilla-beta", 03:08:20 INFO - "repo_path": "releases/mozilla-beta", 03:08:20 INFO - "moz_repo_path": "", 03:08:20 INFO - "stage_platform": "win32", 03:08:20 INFO - "builduid": "8d06091bdfe641d38dc19589f60324f2", 03:08:20 INFO - "slavebuilddir": "test" 03:08:20 INFO - } 03:08:20 INFO - Found a test packages url https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.test_packages.json. 03:08:20 INFO - Found installer url https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.zip. 03:08:20 INFO - Running post-action listener: _resource_record_post_action 03:08:20 INFO - [mozharness: 2017-01-05 11:08:20.377000Z] Finished read-buildbot-config step (success) 03:08:20 INFO - [mozharness: 2017-01-05 11:08:20.377000Z] Running download-and-extract step. 03:08:20 INFO - Running pre-action listener: _resource_record_pre_action 03:08:20 INFO - Running main action method: download_and_extract 03:08:20 INFO - mkdir: C:\slave\test\build\tests 03:08:20 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]} 03:08:20 INFO - trying https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.test_packages.json 03:08:20 INFO - Downloading https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.test_packages.json to C:\slave\test\build\firefox-51.0.en-US.win32.test_packages.json 03:08:20 INFO - retry: Calling _download_file with args: (), kwargs: {'url': 'https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.test_packages.json', 'file_name': 'C:\\slave\\test\\build\\firefox-51.0.en-US.win32.test_packages.json'}, attempt #1 03:08:20 INFO - Downloaded 1240 bytes. 03:08:20 INFO - Reading from file C:\slave\test\build\firefox-51.0.en-US.win32.test_packages.json 03:08:20 INFO - Using the following test package requirements: 03:08:20 INFO - {u'common': [u'firefox-51.0.en-US.win32.common.tests.zip'], 03:08:20 INFO - u'cppunittest': [u'firefox-51.0.en-US.win32.common.tests.zip', 03:08:20 INFO - u'firefox-51.0.en-US.win32.cppunittest.tests.zip'], 03:08:20 INFO - u'gtest': [u'firefox-51.0.en-US.win32.common.tests.zip', 03:08:20 INFO - u'firefox-51.0.en-US.win32.gtest.tests.zip'], 03:08:20 INFO - u'jittest': [u'firefox-51.0.en-US.win32.common.tests.zip', 03:08:20 INFO - u'jsshell-win32.zip'], 03:08:20 INFO - u'mochitest': [u'firefox-51.0.en-US.win32.common.tests.zip', 03:08:20 INFO - u'firefox-51.0.en-US.win32.mochitest.tests.zip'], 03:08:20 INFO - u'mozbase': [u'firefox-51.0.en-US.win32.common.tests.zip'], 03:08:20 INFO - u'reftest': [u'firefox-51.0.en-US.win32.common.tests.zip', 03:08:20 INFO - u'firefox-51.0.en-US.win32.reftest.tests.zip'], 03:08:20 INFO - u'talos': [u'firefox-51.0.en-US.win32.common.tests.zip', 03:08:20 INFO - u'firefox-51.0.en-US.win32.talos.tests.zip'], 03:08:20 INFO - u'web-platform': [u'firefox-51.0.en-US.win32.common.tests.zip', 03:08:20 INFO - u'firefox-51.0.en-US.win32.web-platform.tests.zip'], 03:08:20 INFO - u'xpcshell': [u'firefox-51.0.en-US.win32.common.tests.zip', 03:08:20 INFO - u'firefox-51.0.en-US.win32.xpcshell.tests.zip']} 03:08:20 INFO - Downloading packages: [u'firefox-51.0.en-US.win32.common.tests.zip', u'firefox-51.0.en-US.win32.web-platform.tests.zip'] for test suite category: web-platform 03:08:20 INFO - Downloading and extracting to C:\slave\test\build\tests these dirs bin/*, config/*, mozbase/*, marionette/*, tools/wptserve/*, web-platform/* from https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.common.tests.zip 03:08:20 INFO - retry: Calling fetch_url_into_memory with args: (), kwargs: {'url': u'https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.common.tests.zip'}, attempt #1 03:08:20 INFO - Fetch https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.common.tests.zip into memory 03:08:21 INFO - Expected file size: 19035819 03:08:23 INFO - Downloading and extracting to C:\slave\test\build\tests these dirs bin/*, config/*, mozbase/*, marionette/*, tools/wptserve/*, web-platform/* from https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.web-platform.tests.zip 03:08:23 INFO - retry: Calling fetch_url_into_memory with args: (), kwargs: {'url': u'https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.web-platform.tests.zip'}, attempt #1 03:08:23 INFO - Fetch https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.web-platform.tests.zip into memory 03:08:24 INFO - Expected file size: 41566880 03:09:13 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]} 03:09:13 INFO - trying https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.zip 03:09:13 INFO - Downloading https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.zip to C:\slave\test\build\firefox-51.0.en-US.win32.zip 03:09:13 INFO - retry: Calling _download_file with args: (), kwargs: {'url': 'https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.zip', 'file_name': 'C:\\slave\\test\\build\\firefox-51.0.en-US.win32.zip'}, attempt #1 03:09:18 INFO - Downloaded 68848955 bytes. 03:09:18 INFO - Setting buildbot property build_url to https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.zip 03:09:18 INFO - mkdir: C:\slave\test\properties 03:09:18 INFO - Writing buildbot properties ['build_url'] to C:\slave\test\properties\build_url 03:09:18 INFO - Writing to file C:\slave\test\properties\build_url 03:09:18 INFO - Contents: 03:09:18 INFO - build_url:https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.zip 03:09:18 INFO - Setting buildbot property symbols_url to https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.crashreporter-symbols.zip 03:09:18 INFO - Writing buildbot properties ['symbols_url'] to C:\slave\test\properties\symbols_url 03:09:18 INFO - Writing to file C:\slave\test\properties\symbols_url 03:09:18 INFO - Contents: 03:09:18 INFO - symbols_url:https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.crashreporter-symbols.zip 03:09:18 INFO - Downloading and extracting to C:\slave\test\build\symbols these dirs * from https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.crashreporter-symbols.zip 03:09:18 INFO - retry: Calling fetch_url_into_memory with args: (), kwargs: {'url': 'https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.crashreporter-symbols.zip'}, attempt #1 03:09:18 INFO - Fetch https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.crashreporter-symbols.zip into memory 03:09:19 INFO - Expected file size: 67999395 03:09:39 INFO - Running post-action listener: _resource_record_post_action 03:09:39 INFO - Running post-action listener: set_extra_try_arguments 03:09:39 INFO - [mozharness: 2017-01-05 11:09:39.319000Z] Finished download-and-extract step (success) 03:09:39 INFO - [mozharness: 2017-01-05 11:09:39.319000Z] Running create-virtualenv step. 03:09:39 INFO - Running pre-action listener: _pre_create_virtualenv 03:09:39 INFO - Running pre-action listener: _resource_record_pre_action 03:09:39 INFO - Running main action method: create_virtualenv 03:09:39 INFO - Creating virtualenv C:\slave\test\build\venv 03:09:39 INFO - Running command: ['c:\\mozilla-build\\python27\\python.exe', 'c:/mozilla-build/buildbotve/virtualenv.py', '--no-site-packages', '--distribute', 'C:\\slave\\test\\build\\venv'] in C:\slave\test\build 03:09:39 INFO - Copy/paste: c:\mozilla-build\python27\python.exe c:/mozilla-build/buildbotve/virtualenv.py --no-site-packages --distribute C:\slave\test\build\venv 03:09:41 INFO - New python executable in C:\slave\test\build\venv\Scripts\python.exe 03:09:42 INFO - Installing distribute......................................................................................................................................................................................done. 03:09:43 INFO - Return code: 0 03:09:43 INFO - Installing psutil>=3.1.1 into virtualenv C:\slave\test\build\venv 03:09:43 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]} 03:09:43 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org 03:09:43 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]} 03:09:43 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org 03:09:43 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'psutil>=3.1.1']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00C0B170>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00E9BF20>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00CB04A8>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58D40>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00BEA0D0>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00C12480>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-XP32-IX-056', 'USERDOMAIN': 'T-XP32-IX-056', 'KTS_VERSION': '1.19c', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\WINDOWS', 'NO_EM_RESTART': '1', 'OURDRIVE': 'C:', 'MSVCDIR': 'D:\\msvs8\\VC', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 'MOZILLABUILDDRIVE': 'C:', 'SESSIONNAME': 'Console', 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-056', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'LOGONSERVER': '\\\\T-XP32-IX-056', 'MOZ_NO_REMOTE': '1', 'MOZ_HIDE_RESULTS_TABLE': '1', 'WINDIR': 'C:\\WINDOWS', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'MOZ_AIRBAG': '1', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056\\Application Data', 'HOMEDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'OS': 'Windows_NT', 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056'}}, attempt #1 03:09:43 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'psutil>=3.1.1'] in C:\slave\test\build 03:09:43 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub psutil>=3.1.1 03:09:43 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 03:09:43 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056\\Application Data', 03:09:43 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 03:09:43 INFO - 'COMPUTERNAME': 'T-XP32-IX-056', 03:09:43 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 03:09:43 INFO - 'DCLOCATION': 'SCL3', 03:09:43 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 03:09:43 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 03:09:43 INFO - 'FP_NO_HOST_CHECK': 'NO', 03:09:43 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 03:09:43 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 03:09:43 INFO - 'FRAMEWORKVERSION': 'v2.0.50727', 03:09:43 INFO - 'HOMEDRIVE': 'C:', 03:09:43 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-056', 03:09:43 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS', 03:09:43 INFO - 'KTS_VERSION': '1.19c', 03:09:43 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 03:09:43 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-056', 03:09:43 INFO - 'MONDIR': 'C:\\Monitor_config\\', 03:09:43 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\', 03:09:43 INFO - 'MOZILLABUILD': 'D:\\mozilla-build', 03:09:43 INFO - 'MOZILLABUILDDRIVE': 'C:', 03:09:43 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\', 03:09:43 INFO - 'MOZ_AIRBAG': '1', 03:09:43 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1', 03:09:43 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1', 03:09:43 INFO - 'MOZ_MSVCVERSION': '8', 03:09:43 INFO - 'MOZ_NO_REMOTE': '1', 03:09:43 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 03:09:43 INFO - 'MSVCDIR': 'D:\\msvs8\\VC', 03:09:43 INFO - 'NO_EM_RESTART': '1', 03:09:43 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1', 03:09:43 INFO - 'NUMBER_OF_PROCESSORS': '8', 03:09:43 INFO - 'OS': 'Windows_NT', 03:09:43 INFO - 'OURDRIVE': 'C:', 03:09:43 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 03:09:43 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 03:09:43 INFO - 'PROCESSOR_ARCHITECTURE': 'x86', 03:09:43 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 03:09:43 INFO - 'PROCESSOR_LEVEL': '6', 03:09:43 INFO - 'PROCESSOR_REVISION': '1e05', 03:09:43 INFO - 'PROGRAMFILES': 'C:\\Program Files', 03:09:43 INFO - 'PROMPT': '$P$G', 03:09:43 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 03:09:43 INFO - 'PWD': 'C:\\slave\\test', 03:09:43 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 03:09:43 INFO - 'SESSIONNAME': 'Console', 03:09:43 INFO - 'SLAVEDIR': 'C:\\slave\\', 03:09:43 INFO - 'SYSTEMDRIVE': 'C:', 03:09:43 INFO - 'SYSTEMROOT': 'C:\\WINDOWS', 03:09:43 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 03:09:43 INFO - 'TEST1': 'testie', 03:09:43 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 03:09:43 INFO - 'USERDOMAIN': 'T-XP32-IX-056', 03:09:43 INFO - 'USERNAME': 'cltbld', 03:09:43 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056', 03:09:43 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC', 03:09:43 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 03:09:43 INFO - 'VSINSTALLDIR': 'D:\\msvs8', 03:09:43 INFO - 'WINDIR': 'C:\\WINDOWS', 03:09:43 INFO - 'XPCOM_DEBUG_BREAK': 'warn'} 03:09:44 INFO - Ignoring indexes: http://pypi.python.org/simple/ 03:09:44 INFO - Downloading/unpacking psutil>=3.1.1 03:09:44 INFO - Running setup.py egg_info for package psutil 03:09:44 INFO - warning: no previously-included files matching '*' found under directory 'docs\_build' 03:09:44 INFO - warning: manifest_maker: MANIFEST.in, line 18: 'recursive-include' expects ... 03:09:44 INFO - Installing collected packages: psutil 03:09:44 INFO - Running setup.py install for psutil 03:09:44 INFO - building 'psutil._psutil_windows' extension 03:09:44 INFO - error: Unable to find vcvarsall.bat 03:09:44 INFO - Complete output from command C:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='C:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\docume~1\cltbld~1.t-x\locals~1\temp\pip-n2i9ti-record\install-record.txt --install-headers C:\slave\test\build\venv\include\site\python2.7: 03:09:44 INFO - running install 03:09:44 INFO - running build 03:09:44 INFO - running build_py 03:09:44 INFO - creating build 03:09:44 INFO - creating build\lib.win32-2.7 03:09:44 INFO - creating build\lib.win32-2.7\psutil 03:09:44 INFO - copying psutil\_common.py -> build\lib.win32-2.7\psutil 03:09:44 INFO - copying psutil\_compat.py -> build\lib.win32-2.7\psutil 03:09:44 INFO - copying psutil\_psbsd.py -> build\lib.win32-2.7\psutil 03:09:44 INFO - copying psutil\_pslinux.py -> build\lib.win32-2.7\psutil 03:09:44 INFO - copying psutil\_psosx.py -> build\lib.win32-2.7\psutil 03:09:44 INFO - copying psutil\_psposix.py -> build\lib.win32-2.7\psutil 03:09:44 INFO - copying psutil\_pssunos.py -> build\lib.win32-2.7\psutil 03:09:44 INFO - copying psutil\_pswindows.py -> build\lib.win32-2.7\psutil 03:09:44 INFO - copying psutil\__init__.py -> build\lib.win32-2.7\psutil 03:09:44 INFO - running build_ext 03:09:44 INFO - building 'psutil._psutil_windows' extension 03:09:44 INFO - error: Unable to find vcvarsall.bat 03:09:44 INFO - ---------------------------------------- 03:09:44 INFO - Command C:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='C:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\docume~1\cltbld~1.t-x\locals~1\temp\pip-n2i9ti-record\install-record.txt --install-headers C:\slave\test\build\venv\include\site\python2.7 failed with error code 1 03:09:44 INFO - Storing complete log in C:\Documents and Settings\cltbld.T-XP32-IX-056\Application Data\pip\pip.log 03:09:44 WARNING - Return code: 1 03:09:44 WARNING - Could not install python package: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub psutil>=3.1.1 failed after 1 tries! 03:09:44 INFO - Installing mozsystemmonitor==0.3 into virtualenv C:\slave\test\build\venv 03:09:44 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]} 03:09:44 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org 03:09:44 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]} 03:09:44 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org 03:09:44 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'mozsystemmonitor==0.3']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00C0B170>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00E9BF20>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00CB04A8>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58D40>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00BEA0D0>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00C12480>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-XP32-IX-056', 'USERDOMAIN': 'T-XP32-IX-056', 'KTS_VERSION': '1.19c', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\WINDOWS', 'NO_EM_RESTART': '1', 'OURDRIVE': 'C:', 'MSVCDIR': 'D:\\msvs8\\VC', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 'MOZILLABUILDDRIVE': 'C:', 'SESSIONNAME': 'Console', 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-056', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'LOGONSERVER': '\\\\T-XP32-IX-056', 'MOZ_NO_REMOTE': '1', 'MOZ_HIDE_RESULTS_TABLE': '1', 'WINDIR': 'C:\\WINDOWS', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'MOZ_AIRBAG': '1', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056\\Application Data', 'HOMEDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'OS': 'Windows_NT', 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056'}}, attempt #1 03:09:44 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'mozsystemmonitor==0.3'] in C:\slave\test\build 03:09:44 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub mozsystemmonitor==0.3 03:09:44 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 03:09:44 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056\\Application Data', 03:09:44 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 03:09:44 INFO - 'COMPUTERNAME': 'T-XP32-IX-056', 03:09:44 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 03:09:44 INFO - 'DCLOCATION': 'SCL3', 03:09:44 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 03:09:44 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 03:09:44 INFO - 'FP_NO_HOST_CHECK': 'NO', 03:09:44 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 03:09:44 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 03:09:44 INFO - 'FRAMEWORKVERSION': 'v2.0.50727', 03:09:44 INFO - 'HOMEDRIVE': 'C:', 03:09:44 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-056', 03:09:44 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS', 03:09:44 INFO - 'KTS_VERSION': '1.19c', 03:09:44 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 03:09:44 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-056', 03:09:44 INFO - 'MONDIR': 'C:\\Monitor_config\\', 03:09:44 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\', 03:09:44 INFO - 'MOZILLABUILD': 'D:\\mozilla-build', 03:09:44 INFO - 'MOZILLABUILDDRIVE': 'C:', 03:09:44 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\', 03:09:44 INFO - 'MOZ_AIRBAG': '1', 03:09:44 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1', 03:09:44 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1', 03:09:44 INFO - 'MOZ_MSVCVERSION': '8', 03:09:44 INFO - 'MOZ_NO_REMOTE': '1', 03:09:44 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 03:09:44 INFO - 'MSVCDIR': 'D:\\msvs8\\VC', 03:09:44 INFO - 'NO_EM_RESTART': '1', 03:09:44 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1', 03:09:44 INFO - 'NUMBER_OF_PROCESSORS': '8', 03:09:44 INFO - 'OS': 'Windows_NT', 03:09:44 INFO - 'OURDRIVE': 'C:', 03:09:44 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 03:09:44 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 03:09:44 INFO - 'PROCESSOR_ARCHITECTURE': 'x86', 03:09:44 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 03:09:44 INFO - 'PROCESSOR_LEVEL': '6', 03:09:44 INFO - 'PROCESSOR_REVISION': '1e05', 03:09:44 INFO - 'PROGRAMFILES': 'C:\\Program Files', 03:09:44 INFO - 'PROMPT': '$P$G', 03:09:44 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 03:09:44 INFO - 'PWD': 'C:\\slave\\test', 03:09:44 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 03:09:44 INFO - 'SESSIONNAME': 'Console', 03:09:44 INFO - 'SLAVEDIR': 'C:\\slave\\', 03:09:44 INFO - 'SYSTEMDRIVE': 'C:', 03:09:44 INFO - 'SYSTEMROOT': 'C:\\WINDOWS', 03:09:44 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 03:09:44 INFO - 'TEST1': 'testie', 03:09:44 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 03:09:44 INFO - 'USERDOMAIN': 'T-XP32-IX-056', 03:09:44 INFO - 'USERNAME': 'cltbld', 03:09:44 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056', 03:09:44 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC', 03:09:44 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 03:09:44 INFO - 'VSINSTALLDIR': 'D:\\msvs8', 03:09:44 INFO - 'WINDIR': 'C:\\WINDOWS', 03:09:44 INFO - 'XPCOM_DEBUG_BREAK': 'warn'} 03:09:46 INFO - Ignoring indexes: http://pypi.python.org/simple/ 03:09:46 INFO - Downloading/unpacking mozsystemmonitor==0.3 03:09:46 INFO - Downloading mozsystemmonitor-0.3.tar.gz 03:09:46 INFO - Running setup.py egg_info for package mozsystemmonitor 03:09:46 INFO - Downloading/unpacking psutil>=3.1.1 (from mozsystemmonitor==0.3) 03:09:46 INFO - Running setup.py egg_info for package psutil 03:09:46 INFO - warning: no previously-included files matching '*' found under directory 'docs\_build' 03:09:46 INFO - warning: manifest_maker: MANIFEST.in, line 18: 'recursive-include' expects ... 03:09:46 INFO - Installing collected packages: mozsystemmonitor, psutil 03:09:46 INFO - Running setup.py install for mozsystemmonitor 03:09:46 INFO - Running setup.py install for psutil 03:09:46 INFO - building 'psutil._psutil_windows' extension 03:09:46 INFO - error: Unable to find vcvarsall.bat 03:09:46 INFO - Complete output from command C:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='C:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\docume~1\cltbld~1.t-x\locals~1\temp\pip-jvyn9s-record\install-record.txt --install-headers C:\slave\test\build\venv\include\site\python2.7: 03:09:46 INFO - running install 03:09:46 INFO - running build 03:09:46 INFO - running build_py 03:09:46 INFO - running build_ext 03:09:46 INFO - building 'psutil._psutil_windows' extension 03:09:46 INFO - error: Unable to find vcvarsall.bat 03:09:46 INFO - ---------------------------------------- 03:09:46 INFO - Command C:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='C:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\docume~1\cltbld~1.t-x\locals~1\temp\pip-jvyn9s-record\install-record.txt --install-headers C:\slave\test\build\venv\include\site\python2.7 failed with error code 1 03:09:46 INFO - Storing complete log in C:\Documents and Settings\cltbld.T-XP32-IX-056\Application Data\pip\pip.log 03:09:46 WARNING - Return code: 1 03:09:46 WARNING - Could not install python package: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub mozsystemmonitor==0.3 failed after 1 tries! 03:09:46 INFO - Installing jsonschema==2.5.1 into virtualenv C:\slave\test\build\venv 03:09:46 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]} 03:09:46 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org 03:09:46 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]} 03:09:46 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org 03:09:46 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'jsonschema==2.5.1']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00C0B170>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00E9BF20>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00CB04A8>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58D40>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00BEA0D0>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00C12480>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-XP32-IX-056', 'USERDOMAIN': 'T-XP32-IX-056', 'KTS_VERSION': '1.19c', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\WINDOWS', 'NO_EM_RESTART': '1', 'OURDRIVE': 'C:', 'MSVCDIR': 'D:\\msvs8\\VC', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 'MOZILLABUILDDRIVE': 'C:', 'SESSIONNAME': 'Console', 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-056', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'LOGONSERVER': '\\\\T-XP32-IX-056', 'MOZ_NO_REMOTE': '1', 'MOZ_HIDE_RESULTS_TABLE': '1', 'WINDIR': 'C:\\WINDOWS', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'MOZ_AIRBAG': '1', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056\\Application Data', 'HOMEDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'OS': 'Windows_NT', 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056'}}, attempt #1 03:09:46 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'jsonschema==2.5.1'] in C:\slave\test\build 03:09:46 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub jsonschema==2.5.1 03:09:46 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 03:09:46 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056\\Application Data', 03:09:46 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 03:09:46 INFO - 'COMPUTERNAME': 'T-XP32-IX-056', 03:09:46 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 03:09:46 INFO - 'DCLOCATION': 'SCL3', 03:09:46 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 03:09:46 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 03:09:46 INFO - 'FP_NO_HOST_CHECK': 'NO', 03:09:46 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 03:09:46 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 03:09:46 INFO - 'FRAMEWORKVERSION': 'v2.0.50727', 03:09:46 INFO - 'HOMEDRIVE': 'C:', 03:09:46 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-056', 03:09:46 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS', 03:09:46 INFO - 'KTS_VERSION': '1.19c', 03:09:46 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 03:09:46 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-056', 03:09:46 INFO - 'MONDIR': 'C:\\Monitor_config\\', 03:09:46 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\', 03:09:46 INFO - 'MOZILLABUILD': 'D:\\mozilla-build', 03:09:46 INFO - 'MOZILLABUILDDRIVE': 'C:', 03:09:46 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\', 03:09:46 INFO - 'MOZ_AIRBAG': '1', 03:09:46 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1', 03:09:46 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1', 03:09:46 INFO - 'MOZ_MSVCVERSION': '8', 03:09:46 INFO - 'MOZ_NO_REMOTE': '1', 03:09:46 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 03:09:46 INFO - 'MSVCDIR': 'D:\\msvs8\\VC', 03:09:46 INFO - 'NO_EM_RESTART': '1', 03:09:46 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1', 03:09:46 INFO - 'NUMBER_OF_PROCESSORS': '8', 03:09:46 INFO - 'OS': 'Windows_NT', 03:09:46 INFO - 'OURDRIVE': 'C:', 03:09:46 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 03:09:46 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 03:09:46 INFO - 'PROCESSOR_ARCHITECTURE': 'x86', 03:09:46 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 03:09:46 INFO - 'PROCESSOR_LEVEL': '6', 03:09:46 INFO - 'PROCESSOR_REVISION': '1e05', 03:09:46 INFO - 'PROGRAMFILES': 'C:\\Program Files', 03:09:46 INFO - 'PROMPT': '$P$G', 03:09:46 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 03:09:46 INFO - 'PWD': 'C:\\slave\\test', 03:09:46 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 03:09:46 INFO - 'SESSIONNAME': 'Console', 03:09:46 INFO - 'SLAVEDIR': 'C:\\slave\\', 03:09:46 INFO - 'SYSTEMDRIVE': 'C:', 03:09:46 INFO - 'SYSTEMROOT': 'C:\\WINDOWS', 03:09:46 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 03:09:46 INFO - 'TEST1': 'testie', 03:09:46 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 03:09:46 INFO - 'USERDOMAIN': 'T-XP32-IX-056', 03:09:46 INFO - 'USERNAME': 'cltbld', 03:09:46 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056', 03:09:46 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC', 03:09:46 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 03:09:46 INFO - 'VSINSTALLDIR': 'D:\\msvs8', 03:09:46 INFO - 'WINDIR': 'C:\\WINDOWS', 03:09:46 INFO - 'XPCOM_DEBUG_BREAK': 'warn'} 03:09:46 INFO - Ignoring indexes: http://pypi.python.org/simple/ 03:09:46 INFO - Downloading/unpacking jsonschema==2.5.1 03:09:48 INFO - Running setup.py egg_info for package jsonschema 03:09:48 INFO - zip_safe flag not set; analyzing archive contents... 03:09:48 INFO - install_dir . 03:09:48 INFO - Installed c:\slave\test\build\venv\build\jsonschema\vcversioner-2.16.0.0-py2.7.egg 03:09:48 INFO - Installing collected packages: jsonschema 03:09:48 INFO - Running setup.py install for jsonschema 03:09:48 INFO - Installing jsonschema-script.py script to C:\slave\test\build\venv\Scripts 03:09:48 INFO - Installing jsonschema.exe script to C:\slave\test\build\venv\Scripts 03:09:48 INFO - Successfully installed jsonschema 03:09:48 INFO - Cleaning up... 03:09:48 INFO - Return code: 0 03:09:48 INFO - Installing functools32==3.2.3-2 into virtualenv C:\slave\test\build\venv 03:09:48 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]} 03:09:48 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org 03:09:48 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]} 03:09:48 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org 03:09:48 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'functools32==3.2.3-2']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00C0B170>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00E9BF20>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00CB04A8>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58D40>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00BEA0D0>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00C12480>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-XP32-IX-056', 'USERDOMAIN': 'T-XP32-IX-056', 'KTS_VERSION': '1.19c', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\WINDOWS', 'NO_EM_RESTART': '1', 'OURDRIVE': 'C:', 'MSVCDIR': 'D:\\msvs8\\VC', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 'MOZILLABUILDDRIVE': 'C:', 'SESSIONNAME': 'Console', 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-056', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'LOGONSERVER': '\\\\T-XP32-IX-056', 'MOZ_NO_REMOTE': '1', 'MOZ_HIDE_RESULTS_TABLE': '1', 'WINDIR': 'C:\\WINDOWS', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'MOZ_AIRBAG': '1', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056\\Application Data', 'HOMEDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'OS': 'Windows_NT', 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056'}}, attempt #1 03:09:48 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'functools32==3.2.3-2'] in C:\slave\test\build 03:09:48 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub functools32==3.2.3-2 03:09:48 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 03:09:48 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056\\Application Data', 03:09:48 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 03:09:48 INFO - 'COMPUTERNAME': 'T-XP32-IX-056', 03:09:48 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 03:09:48 INFO - 'DCLOCATION': 'SCL3', 03:09:48 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 03:09:48 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 03:09:48 INFO - 'FP_NO_HOST_CHECK': 'NO', 03:09:48 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 03:09:48 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 03:09:48 INFO - 'FRAMEWORKVERSION': 'v2.0.50727', 03:09:48 INFO - 'HOMEDRIVE': 'C:', 03:09:48 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-056', 03:09:48 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS', 03:09:48 INFO - 'KTS_VERSION': '1.19c', 03:09:48 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 03:09:48 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-056', 03:09:48 INFO - 'MONDIR': 'C:\\Monitor_config\\', 03:09:48 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\', 03:09:48 INFO - 'MOZILLABUILD': 'D:\\mozilla-build', 03:09:48 INFO - 'MOZILLABUILDDRIVE': 'C:', 03:09:48 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\', 03:09:48 INFO - 'MOZ_AIRBAG': '1', 03:09:48 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1', 03:09:48 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1', 03:09:48 INFO - 'MOZ_MSVCVERSION': '8', 03:09:48 INFO - 'MOZ_NO_REMOTE': '1', 03:09:48 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 03:09:48 INFO - 'MSVCDIR': 'D:\\msvs8\\VC', 03:09:48 INFO - 'NO_EM_RESTART': '1', 03:09:48 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1', 03:09:48 INFO - 'NUMBER_OF_PROCESSORS': '8', 03:09:48 INFO - 'OS': 'Windows_NT', 03:09:48 INFO - 'OURDRIVE': 'C:', 03:09:48 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 03:09:48 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 03:09:48 INFO - 'PROCESSOR_ARCHITECTURE': 'x86', 03:09:48 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 03:09:48 INFO - 'PROCESSOR_LEVEL': '6', 03:09:48 INFO - 'PROCESSOR_REVISION': '1e05', 03:09:48 INFO - 'PROGRAMFILES': 'C:\\Program Files', 03:09:48 INFO - 'PROMPT': '$P$G', 03:09:48 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 03:09:48 INFO - 'PWD': 'C:\\slave\\test', 03:09:48 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 03:09:48 INFO - 'SESSIONNAME': 'Console', 03:09:48 INFO - 'SLAVEDIR': 'C:\\slave\\', 03:09:48 INFO - 'SYSTEMDRIVE': 'C:', 03:09:48 INFO - 'SYSTEMROOT': 'C:\\WINDOWS', 03:09:48 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 03:09:48 INFO - 'TEST1': 'testie', 03:09:48 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 03:09:48 INFO - 'USERDOMAIN': 'T-XP32-IX-056', 03:09:48 INFO - 'USERNAME': 'cltbld', 03:09:48 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056', 03:09:48 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC', 03:09:48 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 03:09:48 INFO - 'VSINSTALLDIR': 'D:\\msvs8', 03:09:48 INFO - 'WINDIR': 'C:\\WINDOWS', 03:09:48 INFO - 'XPCOM_DEBUG_BREAK': 'warn'} 03:09:49 INFO - Ignoring indexes: http://pypi.python.org/simple/ 03:09:49 INFO - Downloading/unpacking functools32==3.2.3-2 03:09:49 INFO - Downloading functools32-3.2.3-2.tar.gz 03:09:49 INFO - Running setup.py egg_info for package functools32 03:09:49 INFO - warning: no files found matching '*.txt' 03:09:49 INFO - no previously-included directories found matching 'build' 03:09:49 INFO - no previously-included directories found matching 'dist' 03:09:49 INFO - no previously-included directories found matching '.git*' 03:09:49 INFO - Installing collected packages: functools32 03:09:49 INFO - Running setup.py install for functools32 03:09:49 INFO - warning: no files found matching '*.txt' 03:09:49 INFO - no previously-included directories found matching 'build' 03:09:49 INFO - no previously-included directories found matching 'dist' 03:09:49 INFO - no previously-included directories found matching '.git*' 03:09:49 INFO - Successfully installed functools32 03:09:49 INFO - Cleaning up... 03:09:49 INFO - Return code: 0 03:09:49 INFO - Installing blobuploader==1.2.4 into virtualenv C:\slave\test\build\venv 03:09:49 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]} 03:09:49 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org 03:09:49 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]} 03:09:49 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org 03:09:49 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'blobuploader==1.2.4']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00C0B170>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00E9BF20>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00CB04A8>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58D40>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00BEA0D0>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00C12480>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-XP32-IX-056', 'USERDOMAIN': 'T-XP32-IX-056', 'KTS_VERSION': '1.19c', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\WINDOWS', 'NO_EM_RESTART': '1', 'OURDRIVE': 'C:', 'MSVCDIR': 'D:\\msvs8\\VC', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 'MOZILLABUILDDRIVE': 'C:', 'SESSIONNAME': 'Console', 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-056', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'LOGONSERVER': '\\\\T-XP32-IX-056', 'MOZ_NO_REMOTE': '1', 'MOZ_HIDE_RESULTS_TABLE': '1', 'WINDIR': 'C:\\WINDOWS', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'MOZ_AIRBAG': '1', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056\\Application Data', 'HOMEDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'OS': 'Windows_NT', 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056'}}, attempt #1 03:09:49 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'blobuploader==1.2.4'] in C:\slave\test\build 03:09:49 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub blobuploader==1.2.4 03:09:49 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 03:09:49 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056\\Application Data', 03:09:49 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 03:09:49 INFO - 'COMPUTERNAME': 'T-XP32-IX-056', 03:09:49 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 03:09:49 INFO - 'DCLOCATION': 'SCL3', 03:09:49 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 03:09:49 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 03:09:49 INFO - 'FP_NO_HOST_CHECK': 'NO', 03:09:49 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 03:09:49 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 03:09:49 INFO - 'FRAMEWORKVERSION': 'v2.0.50727', 03:09:49 INFO - 'HOMEDRIVE': 'C:', 03:09:49 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-056', 03:09:49 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS', 03:09:49 INFO - 'KTS_VERSION': '1.19c', 03:09:49 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 03:09:49 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-056', 03:09:49 INFO - 'MONDIR': 'C:\\Monitor_config\\', 03:09:49 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\', 03:09:49 INFO - 'MOZILLABUILD': 'D:\\mozilla-build', 03:09:49 INFO - 'MOZILLABUILDDRIVE': 'C:', 03:09:49 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\', 03:09:49 INFO - 'MOZ_AIRBAG': '1', 03:09:49 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1', 03:09:49 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1', 03:09:49 INFO - 'MOZ_MSVCVERSION': '8', 03:09:49 INFO - 'MOZ_NO_REMOTE': '1', 03:09:49 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 03:09:49 INFO - 'MSVCDIR': 'D:\\msvs8\\VC', 03:09:49 INFO - 'NO_EM_RESTART': '1', 03:09:49 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1', 03:09:49 INFO - 'NUMBER_OF_PROCESSORS': '8', 03:09:49 INFO - 'OS': 'Windows_NT', 03:09:49 INFO - 'OURDRIVE': 'C:', 03:09:49 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 03:09:49 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 03:09:49 INFO - 'PROCESSOR_ARCHITECTURE': 'x86', 03:09:49 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 03:09:49 INFO - 'PROCESSOR_LEVEL': '6', 03:09:49 INFO - 'PROCESSOR_REVISION': '1e05', 03:09:49 INFO - 'PROGRAMFILES': 'C:\\Program Files', 03:09:49 INFO - 'PROMPT': '$P$G', 03:09:49 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 03:09:49 INFO - 'PWD': 'C:\\slave\\test', 03:09:49 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 03:09:49 INFO - 'SESSIONNAME': 'Console', 03:09:49 INFO - 'SLAVEDIR': 'C:\\slave\\', 03:09:49 INFO - 'SYSTEMDRIVE': 'C:', 03:09:49 INFO - 'SYSTEMROOT': 'C:\\WINDOWS', 03:09:49 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 03:09:49 INFO - 'TEST1': 'testie', 03:09:49 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 03:09:49 INFO - 'USERDOMAIN': 'T-XP32-IX-056', 03:09:49 INFO - 'USERNAME': 'cltbld', 03:09:49 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056', 03:09:49 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC', 03:09:49 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 03:09:49 INFO - 'VSINSTALLDIR': 'D:\\msvs8', 03:09:49 INFO - 'WINDIR': 'C:\\WINDOWS', 03:09:49 INFO - 'XPCOM_DEBUG_BREAK': 'warn'} 03:09:50 INFO - Ignoring indexes: http://pypi.python.org/simple/ 03:09:50 INFO - Downloading/unpacking blobuploader==1.2.4 03:09:50 INFO - Downloading blobuploader-1.2.4.tar.gz 03:09:50 INFO - Running setup.py egg_info for package blobuploader 03:09:50 INFO - Downloading/unpacking requests==1.2.3. (from blobuploader==1.2.4) 03:09:52 INFO - Running setup.py egg_info for package requests 03:09:52 INFO - Downloading/unpacking docopt==0.6.1 (from blobuploader==1.2.4) 03:09:52 INFO - Downloading docopt-0.6.1.tar.gz 03:09:52 INFO - Running setup.py egg_info for package docopt 03:09:52 INFO - Installing collected packages: blobuploader, docopt, requests 03:09:52 INFO - Running setup.py install for blobuploader 03:09:52 INFO - Running setup.py install for docopt 03:09:52 INFO - Running setup.py install for requests 03:09:52 INFO - Successfully installed blobuploader docopt requests 03:09:52 INFO - Cleaning up... 03:09:52 INFO - Return code: 0 03:09:52 INFO - Installing None into virtualenv C:\slave\test\build\venv 03:09:52 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]} 03:09:52 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org 03:09:52 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]} 03:09:52 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org 03:09:52 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--no-deps', '--timeout', '120', '-r', 'C:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00C0B170>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00E9BF20>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00CB04A8>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58D40>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00BEA0D0>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00C12480>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build\\tests\\config', 'env': {'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-XP32-IX-056', 'USERDOMAIN': 'T-XP32-IX-056', 'KTS_VERSION': '1.19c', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\WINDOWS', 'NO_EM_RESTART': '1', 'OURDRIVE': 'C:', 'MSVCDIR': 'D:\\msvs8\\VC', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 'MOZILLABUILDDRIVE': 'C:', 'SESSIONNAME': 'Console', 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-056', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'LOGONSERVER': '\\\\T-XP32-IX-056', 'MOZ_NO_REMOTE': '1', 'MOZ_HIDE_RESULTS_TABLE': '1', 'WINDIR': 'C:\\WINDOWS', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'MOZ_AIRBAG': '1', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056\\Application Data', 'HOMEDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'OS': 'Windows_NT', 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056'}}, attempt #1 03:09:52 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--no-deps', '--timeout', '120', '-r', 'C:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub'] in C:\slave\test\build\tests\config 03:09:52 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --no-deps --timeout 120 -r C:\slave\test\build\tests\config\marionette_requirements.txt --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub 03:09:52 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 03:09:52 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056\\Application Data', 03:09:52 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 03:09:52 INFO - 'COMPUTERNAME': 'T-XP32-IX-056', 03:09:52 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 03:09:52 INFO - 'DCLOCATION': 'SCL3', 03:09:52 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 03:09:52 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 03:09:52 INFO - 'FP_NO_HOST_CHECK': 'NO', 03:09:52 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 03:09:52 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 03:09:52 INFO - 'FRAMEWORKVERSION': 'v2.0.50727', 03:09:52 INFO - 'HOMEDRIVE': 'C:', 03:09:52 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-056', 03:09:52 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS', 03:09:52 INFO - 'KTS_VERSION': '1.19c', 03:09:52 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 03:09:52 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-056', 03:09:52 INFO - 'MONDIR': 'C:\\Monitor_config\\', 03:09:52 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\', 03:09:52 INFO - 'MOZILLABUILD': 'D:\\mozilla-build', 03:09:52 INFO - 'MOZILLABUILDDRIVE': 'C:', 03:09:52 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\', 03:09:52 INFO - 'MOZ_AIRBAG': '1', 03:09:52 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1', 03:09:52 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1', 03:09:52 INFO - 'MOZ_MSVCVERSION': '8', 03:09:52 INFO - 'MOZ_NO_REMOTE': '1', 03:09:52 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 03:09:52 INFO - 'MSVCDIR': 'D:\\msvs8\\VC', 03:09:52 INFO - 'NO_EM_RESTART': '1', 03:09:52 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1', 03:09:52 INFO - 'NUMBER_OF_PROCESSORS': '8', 03:09:52 INFO - 'OS': 'Windows_NT', 03:09:52 INFO - 'OURDRIVE': 'C:', 03:09:52 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 03:09:52 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 03:09:52 INFO - 'PROCESSOR_ARCHITECTURE': 'x86', 03:09:52 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 03:09:52 INFO - 'PROCESSOR_LEVEL': '6', 03:09:52 INFO - 'PROCESSOR_REVISION': '1e05', 03:09:52 INFO - 'PROGRAMFILES': 'C:\\Program Files', 03:09:52 INFO - 'PROMPT': '$P$G', 03:09:52 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 03:09:52 INFO - 'PWD': 'C:\\slave\\test', 03:09:52 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 03:09:52 INFO - 'SESSIONNAME': 'Console', 03:09:52 INFO - 'SLAVEDIR': 'C:\\slave\\', 03:09:52 INFO - 'SYSTEMDRIVE': 'C:', 03:09:52 INFO - 'SYSTEMROOT': 'C:\\WINDOWS', 03:09:52 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 03:09:52 INFO - 'TEST1': 'testie', 03:09:52 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 03:09:52 INFO - 'USERDOMAIN': 'T-XP32-IX-056', 03:09:52 INFO - 'USERNAME': 'cltbld', 03:09:52 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056', 03:09:52 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC', 03:09:52 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 03:09:52 INFO - 'VSINSTALLDIR': 'D:\\msvs8', 03:09:52 INFO - 'WINDIR': 'C:\\WINDOWS', 03:09:52 INFO - 'XPCOM_DEBUG_BREAK': 'warn'} 03:09:59 INFO - Ignoring indexes: http://pypi.python.org/simple/ 03:09:59 INFO - Unpacking c:\slave\test\build\tests\mozbase\manifestparser 03:09:59 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmanifestparser 03:09:59 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozcrash 03:09:59 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozcrash 03:09:59 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdebug 03:09:59 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdebug 03:09:59 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdevice 03:09:59 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdevice 03:09:59 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozfile 03:09:59 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozfile 03:09:59 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozhttpd 03:09:59 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozhttpd 03:09:59 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinfo 03:09:59 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinfo 03:09:59 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinstall 03:09:59 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinstall 03:09:59 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozleak 03:09:59 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozleak 03:09:59 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozlog 03:09:59 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozlog 03:09:59 INFO - Unpacking c:\slave\test\build\tests\mozbase\moznetwork 03:09:59 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoznetwork 03:09:59 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprocess 03:09:59 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprocess 03:09:59 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprofile 03:09:59 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprofile 03:09:59 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozrunner 03:09:59 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozrunner 03:09:59 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozscreenshot 03:09:59 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozscreenshot 03:09:59 INFO - Unpacking c:\slave\test\build\tests\mozbase\moztest 03:09:59 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoztest 03:09:59 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozversion 03:09:59 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozversion 03:09:59 INFO - Unpacking c:\slave\test\build\tests\tools\wptserve 03:09:59 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Ctools%5Cwptserve 03:09:59 INFO - Unpacking c:\slave\test\build\tests\marionette\client 03:09:59 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cclient 03:09:59 INFO - Unpacking c:\slave\test\build\tests\marionette\marionette\runner\mixins\browsermob-proxy-py 03:09:59 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cmarionette%5Crunner%5Cmixins%5Cbrowsermob-proxy-py 03:09:59 INFO - Unpacking c:\slave\test\build\tests\marionette 03:09:59 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette 03:09:59 INFO - warning: no files found matching '*.js' under directory 'marionette\touch' 03:09:59 INFO - Installing collected packages: browsermob-proxy, manifestparser, marionette-client, marionette-driver, mozcrash, mozdebug, mozdevice, mozfile, mozhttpd, mozinfo, mozInstall, mozleak, mozlog, moznetwork, mozprocess, mozprofile, mozrunner, mozscreenshot, moztest, mozversion, wptserve 03:09:59 INFO - Running setup.py install for browsermob-proxy 03:10:07 INFO - Running setup.py install for manifestparser 03:10:07 INFO - Installing manifestparser-script.py script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing manifestparser.exe script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Running setup.py install for marionette-client 03:10:07 INFO - warning: no files found matching '*.js' under directory 'marionette\touch' 03:10:07 INFO - Installing marionette-script.py script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing marionette.exe script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Running setup.py install for marionette-driver 03:10:07 INFO - Running setup.py install for mozcrash 03:10:07 INFO - Running setup.py install for mozdebug 03:10:07 INFO - Running setup.py install for mozdevice 03:10:07 INFO - Installing sutini-script.py script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing sutini.exe script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing dm-script.py script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing dm.exe script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Running setup.py install for mozfile 03:10:07 INFO - Running setup.py install for mozhttpd 03:10:07 INFO - Installing mozhttpd-script.py script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing mozhttpd.exe script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Running setup.py install for mozinfo 03:10:07 INFO - Installing mozinfo-script.py script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing mozinfo.exe script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Running setup.py install for mozInstall 03:10:07 INFO - Installing moz_remove_from_system-script.py script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing moz_remove_from_system.exe script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing mozuninstall-script.py script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing mozuninstall.exe script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing mozinstall-script.py script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing mozinstall.exe script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing moz_add_to_system-script.py script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing moz_add_to_system.exe script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Running setup.py install for mozleak 03:10:07 INFO - Running setup.py install for mozlog 03:10:07 INFO - Installing structlog-script.py script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing structlog.exe script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Running setup.py install for moznetwork 03:10:07 INFO - Installing moznetwork-script.py script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing moznetwork.exe script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Running setup.py install for mozprocess 03:10:07 INFO - Running setup.py install for mozprofile 03:10:07 INFO - Installing mozprofile-script.py script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing mozprofile.exe script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing diff-profiles-script.py script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing diff-profiles.exe script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing view-profile-script.py script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing view-profile.exe script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Running setup.py install for mozrunner 03:10:07 INFO - Installing mozrunner-script.py script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing mozrunner.exe script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Running setup.py install for mozscreenshot 03:10:07 INFO - Running setup.py install for moztest 03:10:07 INFO - Running setup.py install for mozversion 03:10:07 INFO - Installing mozversion-script.py script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Installing mozversion.exe script to C:\slave\test\build\venv\Scripts 03:10:07 INFO - Running setup.py install for wptserve 03:10:07 INFO - Successfully installed browsermob-proxy manifestparser marionette-client marionette-driver mozcrash mozdebug mozdevice mozfile mozhttpd mozinfo mozInstall mozleak mozlog moznetwork mozprocess mozprofile mozrunner mozscreenshot moztest mozversion wptserve 03:10:07 INFO - Cleaning up... 03:10:07 INFO - Return code: 0 03:10:07 INFO - Installing None into virtualenv C:\slave\test\build\venv 03:10:07 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]} 03:10:07 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org 03:10:07 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]} 03:10:07 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org 03:10:07 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '-r', 'C:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00C0B170>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00E9BF20>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x00CB04A8>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58D40>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00BEA0D0>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00C12480>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build\\tests\\config', 'env': {'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'MOZILLABUILD': 'D:\\mozilla-build', 'COMPUTERNAME': 'T-XP32-IX-056', 'USERDOMAIN': 'T-XP32-IX-056', 'KTS_VERSION': '1.19c', 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 'MOZILLABUILDPATH': '\\mozilla-build\\', 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\WINDOWS', 'NO_EM_RESTART': '1', 'OURDRIVE': 'C:', 'MSVCDIR': 'D:\\msvs8\\VC', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 'VSINSTALLDIR': 'D:\\msvs8', 'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 'MOZILLABUILDDRIVE': 'C:', 'SESSIONNAME': 'Console', 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-056', 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 'TEST1': 'testie', 'LOGONSERVER': '\\\\T-XP32-IX-056', 'MOZ_NO_REMOTE': '1', 'MOZ_HIDE_RESULTS_TABLE': '1', 'WINDIR': 'C:\\WINDOWS', 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'MOZ_AIRBAG': '1', 'PROMPT': '$P$G', 'USERNAME': 'cltbld', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056\\Application Data', 'HOMEDRIVE': 'C:', 'MOZ_MSVCVERSION': '8', 'FRAMEWORKVERSION': 'v2.0.50727', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'VCINSTALLDIR': 'D:\\msvs8\\VC', 'OS': 'Windows_NT', 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056'}}, attempt #1 03:10:07 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '-r', 'C:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub'] in C:\slave\test\build\tests\config 03:10:07 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 -r C:\slave\test\build\tests\config\marionette_requirements.txt --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub 03:10:07 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 03:10:07 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056\\Application Data', 03:10:07 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 03:10:07 INFO - 'COMPUTERNAME': 'T-XP32-IX-056', 03:10:07 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 03:10:07 INFO - 'DCLOCATION': 'SCL3', 03:10:07 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 03:10:07 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 03:10:07 INFO - 'FP_NO_HOST_CHECK': 'NO', 03:10:07 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 03:10:07 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 03:10:07 INFO - 'FRAMEWORKVERSION': 'v2.0.50727', 03:10:07 INFO - 'HOMEDRIVE': 'C:', 03:10:07 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-056', 03:10:07 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS', 03:10:07 INFO - 'KTS_VERSION': '1.19c', 03:10:07 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 03:10:07 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-056', 03:10:07 INFO - 'MONDIR': 'C:\\Monitor_config\\', 03:10:07 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\', 03:10:07 INFO - 'MOZILLABUILD': 'D:\\mozilla-build', 03:10:07 INFO - 'MOZILLABUILDDRIVE': 'C:', 03:10:07 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\', 03:10:07 INFO - 'MOZ_AIRBAG': '1', 03:10:07 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1', 03:10:07 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1', 03:10:07 INFO - 'MOZ_MSVCVERSION': '8', 03:10:07 INFO - 'MOZ_NO_REMOTE': '1', 03:10:07 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 03:10:07 INFO - 'MSVCDIR': 'D:\\msvs8\\VC', 03:10:07 INFO - 'NO_EM_RESTART': '1', 03:10:07 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1', 03:10:07 INFO - 'NUMBER_OF_PROCESSORS': '8', 03:10:07 INFO - 'OS': 'Windows_NT', 03:10:07 INFO - 'OURDRIVE': 'C:', 03:10:07 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 03:10:07 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 03:10:07 INFO - 'PROCESSOR_ARCHITECTURE': 'x86', 03:10:07 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 03:10:07 INFO - 'PROCESSOR_LEVEL': '6', 03:10:07 INFO - 'PROCESSOR_REVISION': '1e05', 03:10:07 INFO - 'PROGRAMFILES': 'C:\\Program Files', 03:10:07 INFO - 'PROMPT': '$P$G', 03:10:07 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 03:10:07 INFO - 'PWD': 'C:\\slave\\test', 03:10:07 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 03:10:07 INFO - 'SESSIONNAME': 'Console', 03:10:07 INFO - 'SLAVEDIR': 'C:\\slave\\', 03:10:07 INFO - 'SYSTEMDRIVE': 'C:', 03:10:07 INFO - 'SYSTEMROOT': 'C:\\WINDOWS', 03:10:07 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 03:10:07 INFO - 'TEST1': 'testie', 03:10:07 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 03:10:07 INFO - 'USERDOMAIN': 'T-XP32-IX-056', 03:10:07 INFO - 'USERNAME': 'cltbld', 03:10:07 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056', 03:10:07 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC', 03:10:07 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 03:10:07 INFO - 'VSINSTALLDIR': 'D:\\msvs8', 03:10:07 INFO - 'WINDIR': 'C:\\WINDOWS', 03:10:07 INFO - 'XPCOM_DEBUG_BREAK': 'warn'} 03:10:12 INFO - Ignoring indexes: http://pypi.python.org/simple/ 03:10:12 INFO - Unpacking c:\slave\test\build\tests\mozbase\manifestparser 03:10:12 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmanifestparser 03:10:12 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozcrash 03:10:12 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozcrash 03:10:12 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdebug 03:10:12 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdebug 03:10:12 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdevice 03:10:12 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdevice 03:10:12 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozfile 03:10:12 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozfile 03:10:12 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozhttpd 03:10:12 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozhttpd 03:10:12 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinfo 03:10:12 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinfo 03:10:12 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinstall 03:10:12 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinstall 03:10:12 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozleak 03:10:12 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozleak 03:10:12 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozlog 03:10:12 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozlog 03:10:12 INFO - Unpacking c:\slave\test\build\tests\mozbase\moznetwork 03:10:12 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoznetwork 03:10:12 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprocess 03:10:12 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprocess 03:10:12 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprofile 03:10:12 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprofile 03:10:12 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozrunner 03:10:12 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozrunner 03:10:12 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozscreenshot 03:10:12 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozscreenshot 03:10:12 INFO - Unpacking c:\slave\test\build\tests\mozbase\moztest 03:10:12 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoztest 03:10:12 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozversion 03:10:12 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozversion 03:10:12 INFO - Unpacking c:\slave\test\build\tests\tools\wptserve 03:10:12 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Ctools%5Cwptserve 03:10:12 INFO - Unpacking c:\slave\test\build\tests\marionette\client 03:10:12 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cclient 03:10:12 INFO - Unpacking c:\slave\test\build\tests\marionette\marionette\runner\mixins\browsermob-proxy-py 03:10:12 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cmarionette%5Crunner%5Cmixins%5Cbrowsermob-proxy-py 03:10:12 INFO - Unpacking c:\slave\test\build\tests\marionette 03:10:12 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette 03:10:12 INFO - warning: no files found matching '*.js' under directory 'marionette\touch' 03:10:12 INFO - Requirement already satisfied (use --upgrade to upgrade): mozfile>=1.0 in c:\slave\test\build\venv\lib\site-packages (from mozcrash->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 2)) 03:10:19 INFO - Requirement already satisfied (use --upgrade to upgrade): mozlog>=3.0 in c:\slave\test\build\venv\lib\site-packages (from mozcrash->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 2)) 03:10:19 INFO - Requirement already satisfied (use --upgrade to upgrade): mozinfo in c:\slave\test\build\venv\lib\site-packages (from mozdebug->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 3)) 03:10:19 INFO - Requirement already satisfied (use --upgrade to upgrade): moznetwork>=0.24 in c:\slave\test\build\venv\lib\site-packages (from mozdevice->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 4)) 03:10:19 INFO - Requirement already satisfied (use --upgrade to upgrade): mozprocess>=0.19 in c:\slave\test\build\venv\lib\site-packages (from mozdevice->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 4)) 03:10:19 INFO - Downloading/unpacking blessings>=1.3 (from mozlog->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 10)) 03:10:19 INFO - Downloading blessings-1.6.tar.gz 03:10:19 INFO - Running setup.py egg_info for package blessings 03:10:19 INFO - Requirement already satisfied (use --upgrade to upgrade): requests>=1.1.0 in c:\slave\test\build\venv\lib\site-packages (from browsermob-proxy->-r C:\slave\test\build\tests\config\marionette_requirements.txt (line 4)) 03:10:19 INFO - Installing collected packages: blessings, browsermob-proxy, manifestparser, marionette-client, marionette-driver, mozcrash, mozdebug, mozdevice, mozhttpd, mozInstall, mozleak, mozprofile, mozrunner, mozscreenshot, moztest, mozversion, wptserve 03:10:19 INFO - Running setup.py install for blessings 03:10:19 INFO - Running setup.py install for browsermob-proxy 03:10:19 INFO - Running setup.py install for manifestparser 03:10:19 INFO - Installing manifestparser-script.py script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Installing manifestparser.exe script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Running setup.py install for marionette-client 03:10:19 INFO - warning: no files found matching '*.js' under directory 'marionette\touch' 03:10:19 INFO - Installing marionette-script.py script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Installing marionette.exe script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Running setup.py install for marionette-driver 03:10:19 INFO - Running setup.py install for mozcrash 03:10:19 INFO - Running setup.py install for mozdebug 03:10:19 INFO - Running setup.py install for mozdevice 03:10:19 INFO - Installing sutini-script.py script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Installing sutini.exe script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Installing dm-script.py script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Installing dm.exe script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Running setup.py install for mozhttpd 03:10:19 INFO - Installing mozhttpd-script.py script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Installing mozhttpd.exe script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Running setup.py install for mozInstall 03:10:19 INFO - Installing moz_remove_from_system-script.py script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Installing moz_remove_from_system.exe script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Installing mozuninstall-script.py script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Installing mozuninstall.exe script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Installing mozinstall-script.py script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Installing mozinstall.exe script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Installing moz_add_to_system-script.py script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Installing moz_add_to_system.exe script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Running setup.py install for mozleak 03:10:19 INFO - Running setup.py install for mozprofile 03:10:19 INFO - Installing mozprofile-script.py script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Installing mozprofile.exe script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Installing diff-profiles-script.py script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Installing diff-profiles.exe script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Installing view-profile-script.py script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Installing view-profile.exe script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Running setup.py install for mozrunner 03:10:19 INFO - Installing mozrunner-script.py script to C:\slave\test\build\venv\Scripts 03:10:19 INFO - Installing mozrunner.exe script to C:\slave\test\build\venv\Scripts 03:10:20 INFO - Running setup.py install for mozscreenshot 03:10:20 INFO - Running setup.py install for moztest 03:10:20 INFO - Running setup.py install for mozversion 03:10:20 INFO - Installing mozversion-script.py script to C:\slave\test\build\venv\Scripts 03:10:20 INFO - Installing mozversion.exe script to C:\slave\test\build\venv\Scripts 03:10:20 INFO - Running setup.py install for wptserve 03:10:20 INFO - Successfully installed blessings browsermob-proxy manifestparser marionette-client marionette-driver mozcrash mozdebug mozdevice mozhttpd mozInstall mozleak mozprofile mozrunner mozscreenshot moztest mozversion wptserve 03:10:20 INFO - Cleaning up... 03:10:20 INFO - Return code: 0 03:10:20 INFO - Done creating virtualenv C:\slave\test\build\venv. 03:10:20 INFO - Getting output from command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'freeze'] 03:10:20 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip freeze 03:10:21 INFO - Reading from file tmpfile_stdout 03:10:21 INFO - Using _rmtree_windows ... 03:10:21 INFO - Using _rmtree_windows ... 03:10:21 INFO - Current package versions: 03:10:21 INFO - blessings == 1.6 03:10:21 INFO - blobuploader == 1.2.4 03:10:21 INFO - browsermob-proxy == 0.6.0 03:10:21 INFO - distribute == 0.6.14 03:10:21 INFO - docopt == 0.6.1 03:10:21 INFO - functools32 == 3.2.3-2 03:10:21 INFO - jsonschema == 2.5.1 03:10:21 INFO - manifestparser == 1.1 03:10:21 INFO - marionette-client == 3.1.0 03:10:21 INFO - marionette-driver == 2.0.0 03:10:21 INFO - mozInstall == 1.12 03:10:21 INFO - mozcrash == 0.17 03:10:21 INFO - mozdebug == 0.1 03:10:21 INFO - mozdevice == 0.48 03:10:21 INFO - mozfile == 1.2 03:10:21 INFO - mozhttpd == 0.7 03:10:21 INFO - mozinfo == 0.9 03:10:21 INFO - mozleak == 0.1 03:10:21 INFO - mozlog == 3.4 03:10:21 INFO - moznetwork == 0.27 03:10:21 INFO - mozprocess == 0.23 03:10:21 INFO - mozprofile == 0.28 03:10:21 INFO - mozrunner == 6.12 03:10:21 INFO - mozscreenshot == 0.1 03:10:21 INFO - mozsystemmonitor == 0.3 03:10:21 INFO - moztest == 0.7 03:10:21 INFO - mozversion == 1.4 03:10:21 INFO - requests == 1.2.3 03:10:21 INFO - wptserve == 1.4.0 03:10:21 INFO - Running post-action listener: _resource_record_post_action 03:10:21 INFO - Running post-action listener: _start_resource_monitoring 03:10:21 INFO - Starting resource monitoring. 03:10:21 INFO - [mozharness: 2017-01-05 11:10:21.221000Z] Finished create-virtualenv step (success) 03:10:21 INFO - [mozharness: 2017-01-05 11:10:21.221000Z] Running pull step. 03:10:21 INFO - Running pre-action listener: _resource_record_pre_action 03:10:21 INFO - Running main action method: pull 03:10:21 INFO - Pull has nothing to do! 03:10:21 INFO - Running post-action listener: _resource_record_post_action 03:10:21 INFO - [mozharness: 2017-01-05 11:10:21.221000Z] Finished pull step (success) 03:10:21 INFO - [mozharness: 2017-01-05 11:10:21.221000Z] Running install step. 03:10:21 INFO - Running pre-action listener: _resource_record_pre_action 03:10:21 INFO - Running main action method: install 03:10:21 INFO - Getting output from command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'freeze'] 03:10:21 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip freeze 03:10:21 INFO - Reading from file tmpfile_stdout 03:10:21 INFO - Using _rmtree_windows ... 03:10:21 INFO - Using _rmtree_windows ... 03:10:21 INFO - Detecting whether we're running mozinstall >=1.0... 03:10:21 INFO - Getting output from command: ['C:\\slave\\test/build/venv/scripts/python', 'C:\\slave\\test/build/venv/scripts/mozinstall-script.py', '-h'] 03:10:21 INFO - Copy/paste: C:\slave\test/build/venv/scripts/python C:\slave\test/build/venv/scripts/mozinstall-script.py -h 03:10:21 INFO - Reading from file tmpfile_stdout 03:10:21 INFO - Output received: 03:10:21 INFO - Usage: mozinstall-script.py [options] installer 03:10:21 INFO - Options: 03:10:21 INFO - -h, --help show this help message and exit 03:10:21 INFO - -d DEST, --destination=DEST 03:10:21 INFO - Directory to install application into. [default: 03:10:21 INFO - "C:\slave\test"] 03:10:21 INFO - --app=APP Application being installed. [default: firefox] 03:10:21 INFO - Using _rmtree_windows ... 03:10:21 INFO - Using _rmtree_windows ... 03:10:21 INFO - mkdir: C:\slave\test\build\application 03:10:21 INFO - Getting output from command: ['C:\\slave\\test/build/venv/scripts/python', 'C:\\slave\\test/build/venv/scripts/mozinstall-script.py', 'C:\\slave\\test\\build\\firefox-51.0.en-US.win32.zip', '--destination', 'C:\\slave\\test\\build\\application'] 03:10:21 INFO - Copy/paste: C:\slave\test/build/venv/scripts/python C:\slave\test/build/venv/scripts/mozinstall-script.py C:\slave\test\build\firefox-51.0.en-US.win32.zip --destination C:\slave\test\build\application 03:10:24 INFO - Reading from file tmpfile_stdout 03:10:24 INFO - Output received: 03:10:24 INFO - C:\slave\test\build\application\firefox\firefox.exe 03:10:24 INFO - Using _rmtree_windows ... 03:10:24 INFO - Using _rmtree_windows ... 03:10:24 INFO - Running post-action listener: _resource_record_post_action 03:10:24 INFO - [mozharness: 2017-01-05 11:10:24.991000Z] Finished install step (success) 03:10:24 INFO - [mozharness: 2017-01-05 11:10:24.991000Z] Running run-tests step. 03:10:24 INFO - Running pre-action listener: _resource_record_pre_action 03:10:24 INFO - Running main action method: run_tests 03:10:24 INFO - mkdir: C:\slave\test\build\blobber_upload_dir 03:10:24 INFO - Minidump filename unknown. Determining based upon platform and architecture. 03:10:24 INFO - Minidump tooltool manifest unknown. Determining based upon platform and architecture. 03:10:24 INFO - grabbing minidump binary from tooltool 03:10:24 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]} 03:10:25 INFO - retry: Calling run_command with args: (['c:\\mozilla-build\\python27\\python.exe', 'C:/mozilla-build/tooltool.py', '--url', 'https://api.pub.build.mozilla.org/tooltool/', '--authentication-file', 'c:\\builds\\relengapi.tok', 'fetch', '-m', 'C:\\slave\\test\\build\\tests\\config/tooltool-manifests/win32/releng.manifest', '-o'],), kwargs: {'output_timeout': 600, 'error_list': [{'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00A58D40>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x00BEA0D0>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x00C12480>, 'level': 'critical'}, {'substr': 'ERROR - ', 'level': 'error'}], 'cwd': 'C:\\slave\\test\\build', 'privileged': False}, attempt #1 03:10:25 INFO - Running command: ['c:\\mozilla-build\\python27\\python.exe', 'C:/mozilla-build/tooltool.py', '--url', 'https://api.pub.build.mozilla.org/tooltool/', '--authentication-file', 'c:\\builds\\relengapi.tok', 'fetch', '-m', 'C:\\slave\\test\\build\\tests\\config/tooltool-manifests/win32/releng.manifest', '-o'] in C:\slave\test\build 03:10:25 INFO - Copy/paste: c:\mozilla-build\python27\python.exe C:/mozilla-build/tooltool.py --url https://api.pub.build.mozilla.org/tooltool/ --authentication-file c:\builds\relengapi.tok fetch -m C:\slave\test\build\tests\config/tooltool-manifests/win32/releng.manifest -o 03:10:25 INFO - Calling ['c:\\mozilla-build\\python27\\python.exe', 'C:/mozilla-build/tooltool.py', '--url', 'https://api.pub.build.mozilla.org/tooltool/', '--authentication-file', 'c:\\builds\\relengapi.tok', 'fetch', '-m', 'C:\\slave\\test\\build\\tests\\config/tooltool-manifests/win32/releng.manifest', '-o'] with output_timeout 600 03:10:25 INFO - INFO - Attempting to fetch from 'https://api.pub.build.mozilla.org/tooltool/'... 03:10:25 INFO - INFO - File win32-minidump_stackwalk.exe fetched from https://api.pub.build.mozilla.org/tooltool/ as C:\slave\test\build\tmpt45cwr 03:10:25 INFO - INFO - File integrity verified, renaming tmpt45cwr to win32-minidump_stackwalk.exe 03:10:25 INFO - Return code: 0 03:10:25 INFO - Chmoding C:\slave\test\build\win32-minidump_stackwalk.exe to 0755 03:10:25 INFO - ENV: MINIDUMP_SAVE_PATH is now C:\slave\test\build\blobber_upload_dir 03:10:25 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\python', '-u', 'C:\\slave\\test\\build\\tests\\web-platform\\runtests.py', '--log-raw=-', '--log-raw=C:\\slave\\test\\build\\blobber_upload_dir\\wpt_raw.log', '--log-errorsummary=C:\\slave\\test\\build\\blobber_upload_dir\\wpt_errorsummary.log', '--binary=C:\\slave\\test\\build\\application\\firefox\\firefox.exe', '--symbols-path=https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.crashreporter-symbols.zip', '--stackwalk-binary=C:\\slave\\test\\build\\win32-minidump_stackwalk.exe', '--test-type=testharness', '--disable-e10s', '--total-chunks=10', '--this-chunk=2', '--prefs-root=C:\\slave\\test\\build\\tests\\web-platform/prefs', '--processes=1', '--config=C:\\slave\\test\\build\\tests\\web-platform/wptrunner.ini', '--ca-cert-path=C:\\slave\\test\\build\\tests\\web-platform/certs/cacert.pem', '--host-key-path=C:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.key', '--host-cert-path=C:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.pem', '--certutil-binary=C:\\slave\\test\\build\\tests/bin/certutil'] in C:\slave\test\build 03:10:25 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\python -u C:\slave\test\build\tests\web-platform\runtests.py --log-raw=- --log-raw=C:\slave\test\build\blobber_upload_dir\wpt_raw.log --log-errorsummary=C:\slave\test\build\blobber_upload_dir\wpt_errorsummary.log --binary=C:\slave\test\build\application\firefox\firefox.exe --symbols-path=https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.crashreporter-symbols.zip --stackwalk-binary=C:\slave\test\build\win32-minidump_stackwalk.exe --test-type=testharness --disable-e10s --total-chunks=10 --this-chunk=2 --prefs-root=C:\slave\test\build\tests\web-platform/prefs --processes=1 --config=C:\slave\test\build\tests\web-platform/wptrunner.ini --ca-cert-path=C:\slave\test\build\tests\web-platform/certs/cacert.pem --host-key-path=C:\slave\test\build\tests\web-platform/certs/web-platform.test.key --host-cert-path=C:\slave\test\build\tests\web-platform/certs/web-platform.test.pem --certutil-binary=C:\slave\test\build\tests/bin/certutil 03:10:25 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\Documents and Settings\\All Users', 03:10:25 INFO - 'APPDATA': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056\\Application Data', 03:10:25 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files\\Common Files', 03:10:25 INFO - 'COMPUTERNAME': 'T-XP32-IX-056', 03:10:25 INFO - 'COMSPEC': 'C:\\WINDOWS\\system32\\cmd.exe', 03:10:25 INFO - 'DCLOCATION': 'SCL3', 03:10:25 INFO - 'DEVENVDIR': 'D:\\msvs8\\Common7\\IDE', 03:10:25 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 03:10:25 INFO - 'FP_NO_HOST_CHECK': 'NO', 03:10:25 INFO - 'FRAMEWORKDIR': 'C:\\WINDOWS\\Microsoft.NET\\Framework', 03:10:25 INFO - 'FRAMEWORKSDKDIR': 'D:\\msvs8\\SDK\\v2.0', 03:10:25 INFO - 'FRAMEWORKVERSION': 'v2.0.50727', 03:10:25 INFO - 'HOMEDRIVE': 'C:', 03:10:25 INFO - 'HOMEPATH': '\\Documents and Settings\\cltbld.T-XP32-IX-056', 03:10:25 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS', 03:10:25 INFO - 'KTS_VERSION': '1.19c', 03:10:25 INFO - 'LIBPATH': 'C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727;D:\\msvs8\\VC\\ATLMFC\\LIB', 03:10:25 INFO - 'LOGONSERVER': '\\\\T-XP32-IX-056', 03:10:25 INFO - 'MINIDUMP_SAVE_PATH': 'C:\\slave\\test\\build\\blobber_upload_dir', 03:10:25 INFO - 'MONDIR': 'C:\\Monitor_config\\', 03:10:25 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\', 03:10:25 INFO - 'MOZILLABUILD': 'D:\\mozilla-build', 03:10:25 INFO - 'MOZILLABUILDDRIVE': 'C:', 03:10:25 INFO - 'MOZILLABUILDPATH': '\\mozilla-build\\', 03:10:25 INFO - 'MOZ_AIRBAG': '1', 03:10:25 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1', 03:10:25 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1', 03:10:25 INFO - 'MOZ_MSVCVERSION': '8', 03:10:25 INFO - 'MOZ_NO_REMOTE': '1', 03:10:25 INFO - 'MOZ_TOOLS': 'D:\\mozilla-build\\moztools', 03:10:25 INFO - 'MSVCDIR': 'D:\\msvs8\\VC', 03:10:25 INFO - 'NO_EM_RESTART': '1', 03:10:25 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1', 03:10:25 INFO - 'NUMBER_OF_PROCESSORS': '8', 03:10:25 INFO - 'OS': 'Windows_NT', 03:10:25 INFO - 'OURDRIVE': 'C:', 03:10:25 INFO - 'PATH': 'C:\\Program Files\\NVIDIA Corporation\\PhysX\\Common;C:\\WINDOWS\\system32;C:\\WINDOWS;C:\\WINDOWS\\System32\\Wbem;C:\\WINDOWS\\system32\\WindowsPowerShell\\v1.0;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 03:10:25 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.PSC1', 03:10:25 INFO - 'PROCESSOR_ARCHITECTURE': 'x86', 03:10:25 INFO - 'PROCESSOR_IDENTIFIER': 'x86 Family 6 Model 30 Stepping 5, GenuineIntel', 03:10:25 INFO - 'PROCESSOR_LEVEL': '6', 03:10:25 INFO - 'PROCESSOR_REVISION': '1e05', 03:10:25 INFO - 'PROGRAMFILES': 'C:\\Program Files', 03:10:25 INFO - 'PROMPT': '$P$G', 03:10:25 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 03:10:25 INFO - 'PWD': 'C:\\slave\\test', 03:10:25 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 03:10:25 INFO - 'SESSIONNAME': 'Console', 03:10:25 INFO - 'SLAVEDIR': 'C:\\slave\\', 03:10:25 INFO - 'SYSTEMDRIVE': 'C:', 03:10:25 INFO - 'SYSTEMROOT': 'C:\\WINDOWS', 03:10:25 INFO - 'TEMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 03:10:25 INFO - 'TEST1': 'testie', 03:10:25 INFO - 'TMP': 'C:\\DOCUME~1\\CLTBLD~1.T-X\\LOCALS~1\\Temp', 03:10:25 INFO - 'USERDOMAIN': 'T-XP32-IX-056', 03:10:25 INFO - 'USERNAME': 'cltbld', 03:10:25 INFO - 'USERPROFILE': 'C:\\Documents and Settings\\cltbld.T-XP32-IX-056', 03:10:25 INFO - 'VCINSTALLDIR': 'D:\\msvs8\\VC', 03:10:25 INFO - 'VCVARS': 'D:\\msvs8\\VC\\bin\\vcvars32.bat', 03:10:25 INFO - 'VSINSTALLDIR': 'D:\\msvs8', 03:10:25 INFO - 'WINDIR': 'C:\\WINDOWS', 03:10:25 INFO - 'XPCOM_DEBUG_BREAK': 'warn'} 03:10:25 INFO - Calling ['C:\\slave\\test\\build\\venv\\Scripts\\python', '-u', 'C:\\slave\\test\\build\\tests\\web-platform\\runtests.py', '--log-raw=-', '--log-raw=C:\\slave\\test\\build\\blobber_upload_dir\\wpt_raw.log', '--log-errorsummary=C:\\slave\\test\\build\\blobber_upload_dir\\wpt_errorsummary.log', '--binary=C:\\slave\\test\\build\\application\\firefox\\firefox.exe', '--symbols-path=https://queue.taskcluster.net/v1/task/EJuLOyTBQzCcxzOEvKNZMA/artifacts/public/build/firefox-51.0.en-US.win32.crashreporter-symbols.zip', '--stackwalk-binary=C:\\slave\\test\\build\\win32-minidump_stackwalk.exe', '--test-type=testharness', '--disable-e10s', '--total-chunks=10', '--this-chunk=2', '--prefs-root=C:\\slave\\test\\build\\tests\\web-platform/prefs', '--processes=1', '--config=C:\\slave\\test\\build\\tests\\web-platform/wptrunner.ini', '--ca-cert-path=C:\\slave\\test\\build\\tests\\web-platform/certs/cacert.pem', '--host-key-path=C:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.key', '--host-cert-path=C:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.pem', '--certutil-binary=C:\\slave\\test\\build\\tests/bin/certutil'] with output_timeout 1000 03:10:26 INFO - STDERR: C:\slave\test\build\venv\lib\site-packages\mozrunner\utils.py:20: UserWarning: Module wptserve was already imported from C:\slave\test\build\tests\web-platform\tests\tools\wptserve\wptserve\__init__.py, but c:\slave\test\build\venv\lib\site-packages is being added to sys.path 03:10:26 INFO - import pkg_resources 03:10:31 INFO - Using 1 client processes 03:10:34 INFO - SUITE-START | Running 596 tests 03:10:34 INFO - Running testharness tests 03:10:34 INFO - TEST-START | /WebCryptoAPI/generateKey/test_failures.html 03:10:34 INFO - TEST-SKIP | /WebCryptoAPI/generateKey/test_failures.html | took 0ms 03:10:34 INFO - TEST-START | /WebCryptoAPI/generateKey/test_failures_RSA-OAEP.html 03:10:34 INFO - TEST-SKIP | /WebCryptoAPI/generateKey/test_failures_RSA-OAEP.html | took 0ms 03:10:34 INFO - TEST-START | /WebCryptoAPI/generateKey/test_failures_RSA-PSS.html 03:10:34 INFO - TEST-SKIP | /WebCryptoAPI/generateKey/test_failures_RSA-PSS.html | took 0ms 03:10:34 INFO - TEST-START | /WebCryptoAPI/generateKey/test_failures_RSASSA-PKCS1-v1_5.html 03:10:34 INFO - TEST-SKIP | /WebCryptoAPI/generateKey/test_failures_RSASSA-PKCS1-v1_5.html | took 0ms 03:10:34 INFO - TEST-START | /WebCryptoAPI/generateKey/test_successes.html 03:10:34 INFO - TEST-SKIP | /WebCryptoAPI/generateKey/test_successes.html | took 0ms 03:10:34 INFO - TEST-START | /WebCryptoAPI/generateKey/test_successes_AES-CBC.html 03:10:34 INFO - TEST-SKIP | /WebCryptoAPI/generateKey/test_successes_AES-CBC.html | took 0ms 03:10:34 INFO - TEST-START | /WebCryptoAPI/generateKey/test_successes_RSA-OAEP.html 03:10:34 INFO - TEST-SKIP | /WebCryptoAPI/generateKey/test_successes_RSA-OAEP.html | took 0ms 03:10:34 INFO - TEST-START | /WebCryptoAPI/generateKey/test_successes_RSA-PSS.html 03:10:34 INFO - TEST-SKIP | /WebCryptoAPI/generateKey/test_successes_RSA-PSS.html | took 0ms 03:10:34 INFO - TEST-START | /WebCryptoAPI/generateKey/test_successes_RSASSA-PKCS1-v1_5.html 03:10:34 INFO - TEST-SKIP | /WebCryptoAPI/generateKey/test_successes_RSASSA-PKCS1-v1_5.html | took 0ms 03:10:34 INFO - TEST-START | /XMLHttpRequest/send-redirect-post-upload.htm 03:10:34 INFO - TEST-SKIP | /XMLHttpRequest/send-redirect-post-upload.htm | took 0ms 03:10:34 INFO - TEST-START | /content-security-policy/blink-contrib/self-doesnt-match-blob.sub.html 03:10:34 INFO - TEST-SKIP | /content-security-policy/blink-contrib/self-doesnt-match-blob.sub.html | took 0ms 03:10:34 INFO - TEST-START | /content-security-policy/blink-contrib/star-doesnt-match-blob.sub.html 03:10:34 INFO - TEST-SKIP | /content-security-policy/blink-contrib/star-doesnt-match-blob.sub.html | took 0ms 03:10:34 INFO - TEST-START | /content-security-policy/blink-contrib/worker-connect-src-allowed.sub.html 03:10:34 INFO - TEST-SKIP | /content-security-policy/blink-contrib/worker-connect-src-allowed.sub.html | took 0ms 03:10:34 INFO - TEST-START | /content-security-policy/blink-contrib/worker-script-src.sub.html 03:10:34 INFO - TEST-SKIP | /content-security-policy/blink-contrib/worker-script-src.sub.html | took 0ms 03:10:34 INFO - TEST-START | /content-security-policy/frame-ancestors/multiple-frames-meta-ignored.sub.html 03:10:34 INFO - TEST-SKIP | /content-security-policy/frame-ancestors/multiple-frames-meta-ignored.sub.html | took 0ms 03:10:34 INFO - TEST-START | /content-security-policy/frame-ancestors/multiple-frames-self-allowed.sub.html 03:10:34 INFO - TEST-SKIP | /content-security-policy/frame-ancestors/multiple-frames-self-allowed.sub.html | took 0ms 03:10:34 INFO - TEST-START | /content-security-policy/frame-ancestors/single-frame-self-allowed.sub.html 03:10:34 INFO - TEST-SKIP | /content-security-policy/frame-ancestors/single-frame-self-allowed.sub.html | took 0ms 03:10:34 INFO - TEST-START | /content-security-policy/media-src/media-src-7_1.html 03:10:34 INFO - TEST-SKIP | /content-security-policy/media-src/media-src-7_1.html | took 0ms 03:10:34 INFO - TEST-START | /content-security-policy/media-src/media-src-7_3_2.html 03:10:34 INFO - TEST-SKIP | /content-security-policy/media-src/media-src-7_3_2.html | took 0ms 03:10:34 INFO - TEST-START | /content-security-policy/script-src/script-src-1_2.html 03:10:34 INFO - TEST-SKIP | /content-security-policy/script-src/script-src-1_2.html | took 0ms 03:10:34 INFO - TEST-START | /content-security-policy/script-src/script-src-1_2_1.html 03:10:34 INFO - TEST-SKIP | /content-security-policy/script-src/script-src-1_2_1.html | took 0ms 03:10:34 INFO - TEST-START | /content-security-policy/script-src/script-src-1_4_1.html 03:10:34 INFO - TEST-SKIP | /content-security-policy/script-src/script-src-1_4_1.html | took 0ms 03:10:34 INFO - TEST-START | /content-security-policy/style-src/style-src-3_2.html 03:10:34 INFO - TEST-SKIP | /content-security-policy/style-src/style-src-3_2.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/concepts/custom-elements-type-allowed-chars-first-char.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/concepts/custom-elements-type-allowed-chars-first-char.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/concepts/custom-elements-type-allowed-chars.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/concepts/custom-elements-type-allowed-chars.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/concepts/custom-elements-type-naming.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/concepts/custom-elements-type-naming.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/creating-and-passing-registries/new-registry-test.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/creating-and-passing-registries/new-registry-test.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/creating-and-passing-registries/no-registry-test.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/creating-and-passing-registries/no-registry-test.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/creating-and-passing-registries/share-registry-create-document.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/creating-and-passing-registries/share-registry-create-document.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/creating-and-passing-registries/share-registry-import-document.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/creating-and-passing-registries/share-registry-import-document.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/custom-element-lifecycle/enqueuing-and-invoking-callbacks/invoke-callbacks.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/custom-element-lifecycle/enqueuing-and-invoking-callbacks/invoke-callbacks.html | took 75ms 03:10:34 INFO - TEST-START | /custom-elements/v0/custom-element-lifecycle/types-of-callbacks/attached-callback-move-element-test.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/custom-element-lifecycle/types-of-callbacks/attached-callback-move-element-test.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/custom-element-lifecycle/types-of-callbacks/attached-callback-test.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/custom-element-lifecycle/types-of-callbacks/attached-callback-test.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/custom-element-lifecycle/types-of-callbacks/attribute-changed-callback-change-attribute-test.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/custom-element-lifecycle/types-of-callbacks/attribute-changed-callback-change-attribute-test.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/custom-element-lifecycle/types-of-callbacks/attribute-changed-callback-remove-attribute-test.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/custom-element-lifecycle/types-of-callbacks/attribute-changed-callback-remove-attribute-test.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/custom-element-lifecycle/types-of-callbacks/attribute-changed-callback-set-attribute-test.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/custom-element-lifecycle/types-of-callbacks/attribute-changed-callback-set-attribute-test.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/custom-element-lifecycle/types-of-callbacks/created-callback-element-prototype-test.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/custom-element-lifecycle/types-of-callbacks/created-callback-element-prototype-test.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/custom-element-lifecycle/types-of-callbacks/created-callback-invocation-order-test.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/custom-element-lifecycle/types-of-callbacks/created-callback-invocation-order-test.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/custom-element-lifecycle/types-of-callbacks/created-callback-invocation-test.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/custom-element-lifecycle/types-of-callbacks/created-callback-invocation-test.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/custom-element-lifecycle/types-of-callbacks/detached-callback-move-element-test.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/custom-element-lifecycle/types-of-callbacks/detached-callback-move-element-test.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/custom-element-lifecycle/types-of-callbacks/detached-callback-no-browsing-context-test.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/custom-element-lifecycle/types-of-callbacks/detached-callback-no-browsing-context-test.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/custom-element-lifecycle/types-of-callbacks/detached-callback-with-browsing-context-test.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/custom-element-lifecycle/types-of-callbacks/detached-callback-with-browsing-context-test.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/instantiating/changing-is-attribute.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/instantiating/changing-is-attribute.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/instantiating/custom-element-constructor-is-attribute.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/instantiating/custom-element-constructor-is-attribute.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/instantiating/custom-element-constructor-local-name.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/instantiating/custom-element-constructor-local-name.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/instantiating/custom-element-constructor-namespace.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/instantiating/custom-element-constructor-namespace.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/instantiating/custom-element-constructor-node-document.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/instantiating/custom-element-constructor-node-document.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/instantiating/custom-element-constructor-prototype.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/instantiating/custom-element-constructor-prototype.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/instantiating/custom-element-prototype.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/instantiating/custom-element-prototype.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/instantiating/custom-element-type-is-attribute.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/instantiating/custom-element-type-is-attribute.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/instantiating/custom-element-type-local-name-and-is-attribute.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/instantiating/custom-element-type-local-name-and-is-attribute.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/instantiating/custom-element-type-local-name.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/instantiating/custom-element-type-local-name.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/instantiating/extensions-to-document-interface/create-element-interface-type-is-a-local-name.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/instantiating/extensions-to-document-interface/create-element-interface-type-is-a-local-name.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/instantiating/extensions-to-document-interface/create-element-interface-type-is-a-type-extension.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/instantiating/extensions-to-document-interface/create-element-interface-type-is-a-type-extension.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/instantiating/extensions-to-document-interface/create-element-is-attribute.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/instantiating/extensions-to-document-interface/create-element-is-attribute.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/instantiating/extensions-to-document-interface/create-element-namespace.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/instantiating/extensions-to-document-interface/create-element-namespace.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/instantiating/extensions-to-document-interface/create-element-type-extension-is-a-type.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/instantiating/extensions-to-document-interface/create-element-type-extension-is-a-type.html | took 15ms 03:10:34 INFO - TEST-START | /custom-elements/v0/instantiating/extensions-to-document-interface/create-element-type-extension-unresolved.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/instantiating/extensions-to-document-interface/create-element-type-extension-unresolved.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/instantiating/extensions-to-document-interface/create-element-type-is-a-local-name.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/instantiating/extensions-to-document-interface/create-element-type-is-a-local-name.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/instantiating/extensions-to-document-interface/created-callback-create-element-ns.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/instantiating/extensions-to-document-interface/created-callback-create-element-ns.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/instantiating/extensions-to-document-interface/created-callback-create-element.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/instantiating/extensions-to-document-interface/created-callback-create-element.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/instantiating/non-configurable-constructor-property.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/instantiating/non-configurable-constructor-property.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/instantiating/prototype-is-interface-prototype-object.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/instantiating/prototype-is-interface-prototype-object.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/instantiating/unchanged-attribute.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/instantiating/unchanged-attribute.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-default-namespace.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-default-namespace.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-duplicate-definition.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-duplicate-definition.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-invalid-type.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-invalid-type.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-local-name-lowercased.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-local-name-lowercased.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-name-is-null.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-name-is-null.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-no-interface-for-name.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-no-interface-for-name.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace-name-is-null.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace-name-is-null.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-type-name-lowercased.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-type-name-lowercased.html | took 15ms 03:10:34 INFO - TEST-START | /custom-elements/v0/registering/element-registration-algorithm-no-registry.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/registering/element-registration-algorithm-no-registry.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/registering/extensions-to-document-interface/custom-element-name.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/registering/extensions-to-document-interface/custom-element-name.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/registering/extensions-to-document-interface/custom-element-prototype.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/registering/extensions-to-document-interface/custom-element-prototype.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/registering/unresolved-element-pseudoclass/unresolved-element-pseudoclass-matching-query-selector-all.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/registering/unresolved-element-pseudoclass/unresolved-element-pseudoclass-matching-query-selector-all.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/registering/unresolved-element-pseudoclass/unresolved-element-pseudoclass-matching-query-selector.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/registering/unresolved-element-pseudoclass/unresolved-element-pseudoclass-matching-query-selector.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/registering/unresolved-elements-interface-html-element.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/registering/unresolved-elements-interface-html-element.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/registering/unresolved-elements-interface-html-unknown-element.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/registering/unresolved-elements-interface-html-unknown-element.html | took 0ms 03:10:34 INFO - TEST-START | /custom-elements/v0/registering/unresolved-elements-interface-svg-element.html 03:10:34 INFO - TEST-SKIP | /custom-elements/v0/registering/unresolved-elements-interface-svg-element.html | took 0ms 03:10:34 INFO - Setting up ssl 03:10:35 INFO - PROCESS | certutil | 03:10:35 INFO - PROCESS | certutil | 03:10:35 INFO - PROCESS | certutil | 03:10:35 INFO - Certificate Nickname Trust Attributes 03:10:35 INFO - SSL,S/MIME,JAR/XPI 03:10:35 INFO - 03:10:35 INFO - web-platform-tests CT,, 03:10:35 INFO - 03:10:35 INFO - Application command: C:\slave\test\build\application\firefox\firefox.exe -marionette about:blank -profile c:\docume~1\cltbld~1.t-x\locals~1\temp\tmpgy0whi.mozrunner 03:10:35 INFO - Starting runner 03:10:37 INFO - PROCESS | 3752 | [3752] WARNING: Failed to load startupcache file correctly, removing!: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/startupcache/StartupCache.cpp, line 219 03:10:37 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x80004005: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/xpcom/base/nsSystemInfo.cpp, line 115 03:10:37 INFO - PROCESS | 3752 | [3752] WARNING: This method is lossy. Use GetCanonicalPath !: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/xpcom/io/nsLocalFileWin.cpp, line 3579 03:10:39 INFO - PROCESS | 3752 | 1483614639228 Marionette DEBUG Marionette enabled via build flag and pref 03:10:39 INFO - PROCESS | 3752 | ++DOCSHELL 0FED9C00 == 1 [pid = 3752] [id = 1] 03:10:39 INFO - PROCESS | 3752 | ++DOMWINDOW == 1 (0FEDA000) [pid = 3752] [serial = 1] [outer = 00000000] 03:10:39 INFO - PROCESS | 3752 | ++DOMWINDOW == 2 (0FEDA800) [pid = 3752] [serial = 2] [outer = 0FEDA000] 03:10:39 INFO - PROCESS | 3752 | [3752] WARNING: Dwm composition not available, falling back to software vsync: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/gfx/thebes/gfxWindowsPlatform.cpp, line 1957 03:10:39 INFO - PROCESS | 3752 | [3752] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/xpcom/io/nsDirectoryService.cpp, line 500 03:10:39 INFO - PROCESS | 3752 | [3752] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/toolkit/xre/nsXREDirProvider.cpp, line 794 03:10:39 INFO - PROCESS | 3752 | [3752] WARNING: Failed to determine sandbox temp dir path.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/toolkit/xre/nsXREDirProvider.cpp, line 867 03:10:39 INFO - PROCESS | 3752 | ++DOCSHELL 11109800 == 2 [pid = 3752] [id = 2] 03:10:39 INFO - PROCESS | 3752 | ++DOMWINDOW == 3 (11109C00) [pid = 3752] [serial = 3] [outer = 00000000] 03:10:39 INFO - PROCESS | 3752 | ++DOMWINDOW == 4 (1110A400) [pid = 3752] [serial = 4] [outer = 11109C00] 03:10:39 INFO - PROCESS | 3752 | 1483614639849 Marionette INFO Listening on port 2828 03:10:40 INFO - PROCESS | 3752 | 1483614640329 Marionette DEBUG Marionette enabled via command-line flag 03:10:40 INFO - PROCESS | 3752 | ++DOCSHELL 11E26400 == 3 [pid = 3752] [id = 3] 03:10:40 INFO - PROCESS | 3752 | ++DOMWINDOW == 5 (11E2AC00) [pid = 3752] [serial = 5] [outer = 00000000] 03:10:40 INFO - PROCESS | 3752 | ++DOMWINDOW == 6 (11E2B400) [pid = 3752] [serial = 6] [outer = 11E2AC00] 03:10:40 INFO - PROCESS | 3752 | [3752] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/plugins/base/nsPluginHost.cpp, line 2364 03:10:40 INFO - PROCESS | 3752 | ++DOMWINDOW == 7 (12152000) [pid = 3752] [serial = 7] [outer = 11109C00] 03:10:40 INFO - PROCESS | 3752 | 1483614640657 Marionette DEBUG Accepted connection conn0 from 127.0.0.1:1499 03:10:40 INFO - PROCESS | 3752 | 1483614640663 Marionette DEBUG Accepted connection conn1 from 127.0.0.1:1501 03:10:40 INFO - PROCESS | 3752 | 1483614640700 Marionette DEBUG Closed connection conn0 03:10:40 INFO - PROCESS | 3752 | 1483614640702 Marionette DEBUG Closed connection conn1 03:10:40 INFO - PROCESS | 3752 | 1483614640751 Marionette DEBUG Accepted connection conn2 from 127.0.0.1:1502 03:10:40 INFO - PROCESS | 3752 | 1483614640829 Marionette DEBUG Closed connection conn2 03:10:40 INFO - PROCESS | 3752 | 1483614640836 Marionette DEBUG Accepted connection conn3 from 127.0.0.1:1503 03:10:40 INFO - PROCESS | 3752 | 1483614640849 Marionette DEBUG Closed connection conn3 03:10:40 INFO - PROCESS | 3752 | 1483614640856 Marionette DEBUG Accepted connection conn4 from 127.0.0.1:1504 03:10:40 INFO - PROCESS | 3752 | ++DOCSHELL 1288BC00 == 4 [pid = 3752] [id = 4] 03:10:40 INFO - PROCESS | 3752 | ++DOMWINDOW == 8 (1288E000) [pid = 3752] [serial = 8] [outer = 00000000] 03:10:40 INFO - PROCESS | 3752 | ++DOMWINDOW == 9 (12BEE800) [pid = 3752] [serial = 9] [outer = 1288E000] 03:10:40 INFO - PROCESS | 3752 | [3752] WARNING: Direct3D 11-accelerated layers are not supported on this system.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/gfx/thebes/gfxWindowsPlatform.cpp, line 1993 03:10:41 INFO - PROCESS | 3752 | ++DOMWINDOW == 10 (12BF5800) [pid = 3752] [serial = 10] [outer = 1288E000] 03:10:41 INFO - PROCESS | 3752 | 1483614641137 Marionette TRACE conn4 -> [0,1,"newSession",{"sessionId":null,"capabilities":null}] 03:10:41 INFO - PROCESS | 3752 | 1483614641143 Marionette CONFIG Changing capabilities: {"browserName":"firefox","browserVersion":"51.0","platformName":"windows_nt","platformVersion":"5.1","specificationLevel":0,"raisesAccessibilityExceptions":false,"rotatable":false,"acceptSslCerts":false,"takesElementScreenshot":true,"takesScreenshot":true,"proxy":{},"platform":"WINDOWS_NT","XULappId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","appBuildId":"20170105012540","processId":3752,"version":"51.0"} 03:10:41 INFO - PROCESS | 3752 | [3752] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623 03:10:41 INFO - PROCESS | 3752 | [3752] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623 03:10:41 INFO - PROCESS | 3752 | [3752] WARNING: attempt to modify an immutable nsStandardURL: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/netwerk/base/nsStandardURL.cpp, line 1553 03:10:41 INFO - PROCESS | 3752 | [3752] WARNING: attempt to modify an immutable nsStandardURL: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/netwerk/base/nsStandardURL.cpp, line 1553 03:10:41 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:10:41 INFO - PROCESS | 3752 | ++DOCSHELL 14497400 == 5 [pid = 3752] [id = 5] 03:10:41 INFO - PROCESS | 3752 | ++DOMWINDOW == 11 (14B66800) [pid = 3752] [serial = 11] [outer = 00000000] 03:10:42 INFO - PROCESS | 3752 | ++DOCSHELL 15E79400 == 6 [pid = 3752] [id = 6] 03:10:42 INFO - PROCESS | 3752 | ++DOMWINDOW == 12 (15E79800) [pid = 3752] [serial = 12] [outer = 00000000] 03:10:42 INFO - PROCESS | 3752 | ++DOMWINDOW == 13 (16113400) [pid = 3752] [serial = 13] [outer = 15E79800] 03:10:42 INFO - PROCESS | 3752 | [3752] WARNING: Direct3D 11-accelerated layers are not supported on this system.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/gfx/thebes/gfxWindowsPlatform.cpp, line 1993 03:10:42 INFO - PROCESS | 3752 | ++DOMWINDOW == 14 (15DDD000) [pid = 3752] [serial = 14] [outer = 14B66800] 03:10:42 INFO - PROCESS | 3752 | ++DOMWINDOW == 15 (15DDE800) [pid = 3752] [serial = 15] [outer = 15E79800] 03:10:43 INFO - PROCESS | 3752 | 1483614643463 Marionette DEBUG loaded listener.js 03:10:43 INFO - PROCESS | 3752 | ++DOMWINDOW == 16 (16789C00) [pid = 3752] [serial = 16] [outer = 15E79800] 03:10:44 INFO - PROCESS | 3752 | 1483614644058 Marionette TRACE conn4 <- [1,1,null,{"sessionId":"142b7256-c322-4f97-a5f9-c1ae0f2620c5","capabilities":{"browserName":"firefox","browserVersion":"51.0","platformName":"windows_nt","platformVersion":"5.1","specificationLevel":0,"raisesAccessibilityExceptions":false,"rotatable":false,"acceptSslCerts":false,"takesElementScreenshot":true,"takesScreenshot":true,"proxy":{},"platform":"WINDOWS_NT","XULappId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","appBuildId":"20170105012540","processId":3752,"version":"51.0","command_id":1}}] 03:10:44 INFO - PROCESS | 3752 | 1483614644242 Marionette TRACE conn4 -> [0,2,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":128}] 03:10:44 INFO - PROCESS | 3752 | 1483614644323 Marionette TRACE conn4 <- [1,2,null,{"value":null}] 03:10:44 INFO - PROCESS | 3752 | 1483614644422 Marionette TRACE conn4 -> [0,3,"get",{"url":"http://web-platform.test:8000/testharness_runner.html"}] 03:10:44 INFO - PROCESS | 3752 | [3752] WARNING: Could not get disk status from nsIDiskSpaceWatcher: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/uriloader/prefetch/nsOfflineCacheUpdateService.cpp, line 283 03:10:44 INFO - PROCESS | 3752 | ++DOMWINDOW == 17 (17A69C00) [pid = 3752] [serial = 17] [outer = 15E79800] 03:10:44 INFO - PROCESS | 3752 | 1483614644670 Marionette TRACE conn4 <- [1,3,null,{}] 03:10:44 INFO - PROCESS | 3752 | 1483614644681 Marionette TRACE conn4 -> [0,4,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"document.title = 'MainThread'","sandbox":"default","line":140}] 03:10:44 INFO - PROCESS | 3752 | 1483614644709 Marionette TRACE conn4 <- [1,4,null,{"value":null}] 03:10:44 INFO - PROCESS | 3752 | 1483614644747 Marionette TRACE conn4 -> [0,5,"getWindowHandle",null] 03:10:44 INFO - PROCESS | 3752 | 1483614644750 Marionette TRACE conn4 <- [1,5,null,{"value":"12"}] 03:10:44 INFO - TEST-START | /WebCryptoAPI/digest/digest.worker 03:10:44 INFO - PROCESS | 3752 | 1483614644765 Marionette TRACE conn4 -> [0,6,"timeouts",{"script":35000}] 03:10:44 INFO - PROCESS | 3752 | 1483614644770 Marionette TRACE conn4 <- [1,6,null,{}] 03:10:44 INFO - PROCESS | 3752 | 1483614644788 Marionette TRACE conn4 -> [0,7,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:10:44 INFO - PROCESS | 3752 | 1483614644812 Marionette TRACE conn4 <- [1,7,null,{"value":null}] 03:10:44 INFO - PROCESS | 3752 | 1483614644826 Marionette TRACE conn4 -> [0,8,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/digest/digest.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/digest/digest.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:10:44 INFO - PROCESS | 3752 | ++DOCSHELL 15E78400 == 7 [pid = 3752] [id = 7] 03:10:44 INFO - PROCESS | 3752 | ++DOMWINDOW == 18 (1843A400) [pid = 3752] [serial = 18] [outer = 00000000] 03:10:44 INFO - PROCESS | 3752 | ++DOMWINDOW == 19 (1843D800) [pid = 3752] [serial = 19] [outer = 1843A400] 03:10:44 INFO - PROCESS | 3752 | 1483614644886 Marionette DEBUG loaded listener.js 03:10:44 INFO - PROCESS | 3752 | ++DOMWINDOW == 20 (1843CC00) [pid = 3752] [serial = 20] [outer = 1843A400] 03:10:45 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:10:45 INFO - PROCESS | 3752 | ++DOCSHELL 18434000 == 8 [pid = 3752] [id = 8] 03:10:45 INFO - PROCESS | 3752 | ++DOMWINDOW == 21 (18692C00) [pid = 3752] [serial = 21] [outer = 00000000] 03:10:45 INFO - PROCESS | 3752 | ++DOMWINDOW == 22 (186E9000) [pid = 3752] [serial = 22] [outer = 18692C00] 03:10:45 INFO - PROCESS | 3752 | 1483614645178 Marionette DEBUG loaded listener.js 03:10:45 INFO - PROCESS | 3752 | ++DOMWINDOW == 23 (1682AC00) [pid = 3752] [serial = 23] [outer = 18692C00] 03:10:46 INFO - PROCESS | 3752 | 1483614646960 Marionette TRACE conn4 <- [1,8,null,{"value":["/WebCryptoAPI/digest/digest.worker",0,null,null,[["SHA-1 with empty source data",0,{},{}],["sha-1 with empty source data",0,{},{}],["Sha-1 with empty source data",0,{},{}],["SHA-1 with empty source data and altered buffer after call",0,{},{}],["SHA-256 with empty source data",0,{},{}],["sha-256 with empty source data",0,{},{}],["Sha-256 with empty source data",0,{},{}],["SHA-256 with empty source data and altered buffer after call",0,{},{}],["SHA-384 with empty source data",0,{},{}],["sha-384 with empty source data",0,{},{}],["Sha-384 with empty source data",0,{},{}],["SHA-384 with empty source data and altered buffer after call",0,{},{}],["SHA-512 with empty source data",0,{},{}],["sha-512 with empty source data",0,{},{}],["Sha-512 with empty source data",0,{},{}],["SHA-512 with empty source data and altered buffer after call",0,{},{}],["SHA-1 with short source data",0,{},{}],["sha-1 with short source data",0,{},{}],["Sha-1 with short source data",0,{},{}],["SHA-1 with short source data and altered buffer after call",0,{},{}],["SHA-256 with short source data",0,{},{}],["sha-256 with short source data",0,{},{}],["Sha-256 with short source data",0,{},{}],["SHA-256 with short source data and altered buffer after call",0,{},{}],["SHA-384 with short source data",0,{},{}],["sha-384 with short source data",0,{},{}],["Sha-384 with short source data",0,{},{}],["SHA-384 with short source data and altered buffer after call",0,{},{}],["SHA-512 with short source data",0,{},{}],["sha-512 with short source data",0,{},{}],["Sha-512 with short source data",0,{},{}],["SHA-512 with short source data and altered buffer after call",0,{},{}],["SHA-1 with medium source data",0,{},{}],["sha-1 with medium source data",0,{},{}],["Sha-1 with medium source data",0,{},{}],["SHA-1 with medium source data and altered buffer after call",0,{},{}],["SHA-256 with medium source data",0,{},{}],["sha-256 with medium source data",0,{},{}],["Sha-256 with medium source data",0,{},{}],["SHA-256 with medium source data and altered buffer after call",0,{},{}],["SHA-384 with medium source data",0,{},{}],["sha-384 with medium source data",0,{},{}],["Sha-384 with medium source data",0,{},{}],["SHA-384 with medium source data and altered buffer after call",0,{},{}],["SHA-512 with medium source data",0,{},{}],["sha-512 with medium source data",0,{},{}],["Sha-512 with medium source data",0,{},{}],["SHA-512 with medium source data and altered buffer after call",0,{},{}],["SHA-1 with long source data",0,{},{}],["sha-1 with long source data",0,{},{}],["Sha-1 with long source data",0,{},{}],["SHA-1 with long source data and altered buffer after call",0,{},{}],["SHA-256 with long source data",0,{},{}],["sha-256 with long source data",0,{},{}],["Sha-256 with long source data",0,{},{}],["SHA-256 with long source data and altered buffer after call",0,{},{}],["SHA-384 with long source data",0,{},{}],["sha-384 with long source data",0,{},{}],["Sha-384 with long source data",0,{},{}],["SHA-384 with long source data and altered buffer after call",0,{},{}],["SHA-512 with long source data",0,{},{}],["sha-512 with long source data",0,{},{}],["Sha-512 with long source data",0,{},{}],["SHA-512 with long source data and altered buffer after call",0,{},{}],["AES-GCM with empty",0,{},{}],["RSA-OAEP with empty",0,{},{}],["PBKDF2 with empty",0,{},{}],["AES-KW with empty",0,{},{}],["AES-GCM with short",0,{},{}],["RSA-OAEP with short",0,{},{}],["PBKDF2 with short",0,{},{}],["AES-KW with short",0,{},{}],["AES-GCM with medium",0,{},{}],["RSA-OAEP with medium",0,{},{}],["PBKDF2 with medium",0,{},{}],["AES-KW with medium",0,{},{}],["AES-GCM with long",0,{},{}],["RSA-OAEP with long",0,{},{}],["PBKDF2 with long",0,{},{}],["AES-KW with long",0,{},{}]]]}] 03:10:47 INFO - ................................................................................ 03:10:47 INFO - TEST-OK | /WebCryptoAPI/digest/digest.worker | took 2262ms 03:10:47 INFO - PROCESS | 3752 | 1483614647023 Marionette TRACE conn4 -> [0,9,"getWindowHandle",null] 03:10:47 INFO - PROCESS | 3752 | 1483614647025 Marionette TRACE conn4 <- [1,9,null,{"value":"12"}] 03:10:47 INFO - TEST-START | /WebCryptoAPI/digest/test_digest.html 03:10:47 INFO - PROCESS | 3752 | 1483614647029 Marionette TRACE conn4 -> [0,10,"timeouts",{"script":185000}] 03:10:47 INFO - PROCESS | 3752 | 1483614647032 Marionette TRACE conn4 <- [1,10,null,{}] 03:10:47 INFO - PROCESS | 3752 | 1483614647041 Marionette TRACE conn4 -> [0,11,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:10:47 INFO - PROCESS | 3752 | 1483614647163 Marionette TRACE conn4 <- [1,11,null,{"value":null}] 03:10:47 INFO - PROCESS | 3752 | 1483614647169 Marionette TRACE conn4 -> [0,12,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/digest/test_digest.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/digest/test_digest.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:10:47 INFO - PROCESS | 3752 | ++DOCSHELL 18691800 == 9 [pid = 3752] [id = 9] 03:10:47 INFO - PROCESS | 3752 | ++DOMWINDOW == 24 (189E0800) [pid = 3752] [serial = 24] [outer = 00000000] 03:10:47 INFO - PROCESS | 3752 | ++DOMWINDOW == 25 (194C4000) [pid = 3752] [serial = 25] [outer = 189E0800] 03:10:47 INFO - PROCESS | 3752 | 1483614647226 Marionette DEBUG loaded listener.js 03:10:47 INFO - PROCESS | 3752 | ++DOMWINDOW == 26 (194C4C00) [pid = 3752] [serial = 26] [outer = 189E0800] 03:10:47 INFO - PROCESS | 3752 | 1483614647985 Marionette TRACE conn4 <- [1,12,null,{"value":["/WebCryptoAPI/digest/test_digest.html",0,null,null,[["SHA-1 with empty source data",0,null,null],["sha-1 with empty source data",0,null,null],["Sha-1 with empty source data",0,null,null],["SHA-1 with empty source data and altered buffer after call",0,null,null],["SHA-256 with empty source data",0,null,null],["sha-256 with empty source data",0,null,null],["Sha-256 with empty source data",0,null,null],["SHA-256 with empty source data and altered buffer after call",0,null,null],["SHA-384 with empty source data",0,null,null],["sha-384 with empty source data",0,null,null],["Sha-384 with empty source data",0,null,null],["SHA-384 with empty source data and altered buffer after call",0,null,null],["SHA-512 with empty source data",0,null,null],["sha-512 with empty source data",0,null,null],["Sha-512 with empty source data",0,null,null],["SHA-512 with empty source data and altered buffer after call",0,null,null],["SHA-1 with short source data",0,null,null],["sha-1 with short source data",0,null,null],["Sha-1 with short source data",0,null,null],["SHA-1 with short source data and altered buffer after call",0,null,null],["SHA-256 with short source data",0,null,null],["sha-256 with short source data",0,null,null],["Sha-256 with short source data",0,null,null],["SHA-256 with short source data and altered buffer after call",0,null,null],["SHA-384 with short source data",0,null,null],["sha-384 with short source data",0,null,null],["Sha-384 with short source data",0,null,null],["SHA-384 with short source data and altered buffer after call",0,null,null],["SHA-512 with short source data",0,null,null],["sha-512 with short source data",0,null,null],["Sha-512 with short source data",0,null,null],["SHA-512 with short source data and altered buffer after call",0,null,null],["SHA-1 with medium source data",0,null,null],["sha-1 with medium source data",0,null,null],["Sha-1 with medium source data",0,null,null],["SHA-1 with medium source data and altered buffer after call",0,null,null],["SHA-256 with medium source data",0,null,null],["sha-256 with medium source data",0,null,null],["Sha-256 with medium source data",0,null,null],["SHA-256 with medium source data and altered buffer after call",0,null,null],["SHA-384 with medium source data",0,null,null],["sha-384 with medium source data",0,null,null],["Sha-384 with medium source data",0,null,null],["SHA-384 with medium source data and altered buffer after call",0,null,null],["SHA-512 with medium source data",0,null,null],["sha-512 with medium source data",0,null,null],["Sha-512 with medium source data",0,null,null],["SHA-512 with medium source data and altered buffer after call",0,null,null],["SHA-1 with long source data",0,null,null],["sha-1 with long source data",0,null,null],["Sha-1 with long source data",0,null,null],["SHA-1 with long source data and altered buffer after call",0,null,null],["SHA-256 with long source data",0,null,null],["sha-256 with long source data",0,null,null],["Sha-256 with long source data",0,null,null],["SHA-256 with long source data and altered buffer after call",0,null,null],["SHA-384 with long source data",0,null,null],["sha-384 with long source data",0,null,null],["Sha-384 with long source data",0,null,null],["SHA-384 with long source data and altered buffer after call",0,null,null],["SHA-512 with long source data",0,null,null],["sha-512 with long source data",0,null,null],["Sha-512 with long source data",0,null,null],["SHA-512 with long source data and altered buffer after call",0,null,null],["AES-GCM with empty",0,null,null],["RSA-OAEP with empty",0,null,null],["PBKDF2 with empty",0,null,null],["AES-KW with empty",0,null,null],["AES-GCM with short",0,null,null],["RSA-OAEP with short",0,null,null],["PBKDF2 with short",0,null,null],["AES-KW with short",0,null,null],["AES-GCM with medium",0,null,null],["RSA-OAEP with medium",0,null,null],["PBKDF2 with medium",0,null,null],["AES-KW with medium",0,null,null],["AES-GCM with long",0,null,null],["RSA-OAEP with long",0,null,null],["PBKDF2 with long",0,null,null],["AES-KW with long",0,null,null]]]}] 03:10:48 INFO - ................................................................................ 03:10:48 INFO - TEST-OK | /WebCryptoAPI/digest/test_digest.html | took 1010ms 03:10:48 INFO - PROCESS | 3752 | 1483614648045 Marionette TRACE conn4 -> [0,13,"getWindowHandle",null] 03:10:48 INFO - PROCESS | 3752 | 1483614648048 Marionette TRACE conn4 <- [1,13,null,{"value":"12"}] 03:10:48 INFO - TEST-START | /WebCryptoAPI/encrypt_decrypt/aes_cbc.worker 03:10:48 INFO - PROCESS | 3752 | 1483614648053 Marionette TRACE conn4 -> [0,14,"timeouts",{"script":35000}] 03:10:48 INFO - PROCESS | 3752 | 1483614648056 Marionette TRACE conn4 <- [1,14,null,{}] 03:10:48 INFO - PROCESS | 3752 | 1483614648060 Marionette TRACE conn4 -> [0,15,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:10:48 INFO - PROCESS | 3752 | 1483614648175 Marionette TRACE conn4 <- [1,15,null,{"value":null}] 03:10:48 INFO - PROCESS | 3752 | 1483614648182 Marionette TRACE conn4 -> [0,16,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/encrypt_decrypt/aes_cbc.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/encrypt_decrypt/aes_cbc.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:10:48 INFO - PROCESS | 3752 | ++DOCSHELL 1A2EC000 == 10 [pid = 3752] [id = 10] 03:10:48 INFO - PROCESS | 3752 | ++DOMWINDOW == 27 (1A696400) [pid = 3752] [serial = 27] [outer = 00000000] 03:10:48 INFO - PROCESS | 3752 | ++DOMWINDOW == 28 (1A6A1C00) [pid = 3752] [serial = 28] [outer = 1A696400] 03:10:48 INFO - PROCESS | 3752 | 1483614648239 Marionette DEBUG loaded listener.js 03:10:48 INFO - PROCESS | 3752 | ++DOMWINDOW == 29 (19ABE400) [pid = 3752] [serial = 29] [outer = 1A696400] 03:10:48 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:10:48 INFO - PROCESS | 3752 | ++DOCSHELL 19AC3800 == 11 [pid = 3752] [id = 11] 03:10:48 INFO - PROCESS | 3752 | ++DOMWINDOW == 30 (19AC3C00) [pid = 3752] [serial = 30] [outer = 00000000] 03:10:48 INFO - PROCESS | 3752 | ++DOMWINDOW == 31 (19AC5C00) [pid = 3752] [serial = 31] [outer = 19AC3C00] 03:10:48 INFO - PROCESS | 3752 | ++DOMWINDOW == 32 (1AD79800) [pid = 3752] [serial = 32] [outer = 19AC3C00] 03:10:48 INFO - PROCESS | 3752 | ++DOCSHELL 184C2000 == 12 [pid = 3752] [id = 12] 03:10:48 INFO - PROCESS | 3752 | ++DOMWINDOW == 33 (1AD80400) [pid = 3752] [serial = 33] [outer = 00000000] 03:10:48 INFO - PROCESS | 3752 | ++DOMWINDOW == 34 (1AD85000) [pid = 3752] [serial = 34] [outer = 1AD80400] 03:10:48 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFE: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:48 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFE: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:48 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFE: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:48 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFE: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:48 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFE: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:48 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFE: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:48 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFE: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:48 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFE: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:48 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFE: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:48 INFO - PROCESS | 3752 | ++DOMWINDOW == 35 (1BD29000) [pid = 3752] [serial = 35] [outer = 1AD80400] 03:10:49 INFO - PROCESS | 3752 | --DOCSHELL 0FED9C00 == 11 [pid = 3752] [id = 1] 03:10:49 INFO - PROCESS | 3752 | 1483614649408 Marionette TRACE conn4 <- [1,16,null,{"value":["/WebCryptoAPI/encrypt_decrypt/aes_cbc.worker",0,null,null,[["AES-CBC 128-bit key",0,{},{}],["AES-CBC 192-bit key",0,{},{}],["AES-CBC 256-bit key",0,{},{}],["AES-CBC 128-bit key with altered plaintext",0,{},{}],["AES-CBC 192-bit key with altered plaintext",0,{},{}],["AES-CBC 256-bit key with altered plaintext",0,{},{}],["AES-CBC 128-bit key decryption",0,{},{}],["AES-CBC 192-bit key decryption",0,{},{}],["AES-CBC 256-bit key decryption",0,{},{}],["AES-CBC 128-bit key decryption with altered ciphertext",0,{},{}],["AES-CBC 192-bit key decryption with altered ciphertext",0,{},{}],["AES-CBC 256-bit key decryption with altered ciphertext",0,{},{}],["AES-CBC 128-bit key without encrypt usage",0,{},{}],["AES-CBC 192-bit key without encrypt usage",0,{},{}],["AES-CBC 256-bit key without encrypt usage",0,{},{}],["AES-CBC 128-bit key with mismatched key and algorithm",0,{},{}],["AES-CBC 192-bit key with mismatched key and algorithm",0,{},{}],["AES-CBC 256-bit key with mismatched key and algorithm",0,{},{}],["AES-CBC 128-bit key without decrypt usage",0,{},{}],["AES-CBC 192-bit key without decrypt usage",0,{},{}],["AES-CBC 256-bit key without decrypt usage",0,{},{}],["AES-CBC 128-bit key, 64-bit IV",1,"assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/ [0,17,"getWindowHandle",null] 03:10:49 INFO - PROCESS | 3752 | 1483614649494 Marionette TRACE conn4 <- [1,17,null,{"value":"12"}] 03:10:49 INFO - TEST-START | /WebCryptoAPI/encrypt_decrypt/aes_ctr.worker 03:10:49 INFO - PROCESS | 3752 | 1483614649501 Marionette TRACE conn4 -> [0,18,"timeouts",{"script":35000}] 03:10:49 INFO - PROCESS | 3752 | 1483614649506 Marionette TRACE conn4 <- [1,18,null,{}] 03:10:49 INFO - PROCESS | 3752 | 1483614649556 Marionette TRACE conn4 -> [0,19,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:10:49 INFO - PROCESS | 3752 | 1483614649679 Marionette TRACE conn4 <- [1,19,null,{"value":null}] 03:10:49 INFO - PROCESS | 3752 | 1483614649776 Marionette TRACE conn4 -> [0,20,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/encrypt_decrypt/aes_ctr.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/encrypt_decrypt/aes_ctr.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:10:49 INFO - PROCESS | 3752 | ++DOCSHELL 0F9C7400 == 12 [pid = 3752] [id = 13] 03:10:49 INFO - PROCESS | 3752 | ++DOMWINDOW == 36 (0F9C7800) [pid = 3752] [serial = 36] [outer = 00000000] 03:10:49 INFO - PROCESS | 3752 | ++DOMWINDOW == 37 (0FB0C400) [pid = 3752] [serial = 37] [outer = 0F9C7800] 03:10:49 INFO - PROCESS | 3752 | 1483614649847 Marionette DEBUG loaded listener.js 03:10:49 INFO - PROCESS | 3752 | ++DOMWINDOW == 38 (0FB09C00) [pid = 3752] [serial = 38] [outer = 0F9C7800] 03:10:50 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:10:50 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:50 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:50 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:50 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:50 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:50 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:50 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:50 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:50 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:50 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:50 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:50 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:50 INFO - PROCESS | 3752 | 1483614650702 Marionette TRACE conn4 <- [1,20,null,{"value":["/WebCryptoAPI/encrypt_decrypt/aes_ctr.worker",0,null,null,[["AES-CTR 128-bit key",0,{},{}],["AES-CTR 192-bit key",0,{},{}],["AES-CTR 256-bit key",0,{},{}],["AES-CTR 128-bit key with altered plaintext",0,{},{}],["AES-CTR 192-bit key with altered plaintext",0,{},{}],["AES-CTR 256-bit key with altered plaintext",0,{},{}],["AES-CTR 128-bit key decryption",0,{},{}],["AES-CTR 192-bit key decryption",0,{},{}],["AES-CTR 256-bit key decryption",0,{},{}],["AES-CTR 128-bit key decryption with altered ciphertext",0,{},{}],["AES-CTR 192-bit key decryption with altered ciphertext",0,{},{}],["AES-CTR 256-bit key decryption with altered ciphertext",0,{},{}],["AES-CTR 128-bit key without encrypt usage",0,{},{}],["AES-CTR 192-bit key without encrypt usage",0,{},{}],["AES-CTR 256-bit key without encrypt usage",0,{},{}],["AES-CTR 128-bit key with mismatched key and algorithm",0,{},{}],["AES-CTR 192-bit key with mismatched key and algorithm",0,{},{}],["AES-CTR 256-bit key with mismatched key and algorithm",0,{},{}],["AES-CTR 128-bit key without decrypt usage",0,{},{}],["AES-CTR 192-bit key without decrypt usage",0,{},{}],["AES-CTR 256-bit key without decrypt usage",0,{},{}],["AES-CTR 128-bit key, 0-bit counter",0,{},{}],["AES-CTR 128-bit key, 129-bit counter",0,{},{}],["AES-CTR 192-bit key, 0-bit counter",0,{},{}],["AES-CTR 192-bit key, 129-bit counter",0,{},{}],["AES-CTR 256-bit key, 0-bit counter",0,{},{}],["AES-CTR 256-bit key, 129-bit counter",0,{},{}],["AES-CTR 128-bit key, 0-bit counter decryption",0,{},{}],["AES-CTR 128-bit key, 129-bit counter decryption",0,{},{}],["AES-CTR 192-bit key, 0-bit counter decryption",0,{},{}],["AES-CTR 192-bit key, 129-bit counter decryption",0,{},{}],["AES-CTR 256-bit key, 0-bit counter decryption",0,{},{}],["AES-CTR 256-bit key, 129-bit counter decryption",0,{},{}]]]}] 03:10:50 INFO - ................................. 03:10:50 INFO - TEST-OK | /WebCryptoAPI/encrypt_decrypt/aes_ctr.worker | took 1251ms 03:10:50 INFO - PROCESS | 3752 | 1483614650787 Marionette TRACE conn4 -> [0,21,"getWindowHandle",null] 03:10:50 INFO - PROCESS | 3752 | 1483614650792 Marionette TRACE conn4 <- [1,21,null,{"value":"12"}] 03:10:50 INFO - TEST-START | /WebCryptoAPI/encrypt_decrypt/aes_gcm.worker 03:10:50 INFO - PROCESS | 3752 | 1483614650800 Marionette TRACE conn4 -> [0,22,"timeouts",{"script":35000}] 03:10:50 INFO - PROCESS | 3752 | 1483614650804 Marionette TRACE conn4 <- [1,22,null,{}] 03:10:50 INFO - PROCESS | 3752 | 1483614650814 Marionette TRACE conn4 -> [0,23,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:10:50 INFO - PROCESS | 3752 | 1483614650931 Marionette TRACE conn4 <- [1,23,null,{"value":null}] 03:10:50 INFO - PROCESS | 3752 | 1483614650991 Marionette TRACE conn4 -> [0,24,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/encrypt_decrypt/aes_gcm.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/encrypt_decrypt/aes_gcm.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:10:50 INFO - PROCESS | 3752 | ++DOCSHELL 0FB04C00 == 13 [pid = 3752] [id = 14] 03:10:50 INFO - PROCESS | 3752 | ++DOMWINDOW == 39 (0FB05000) [pid = 3752] [serial = 39] [outer = 00000000] 03:10:51 INFO - PROCESS | 3752 | ++DOMWINDOW == 40 (0FBB6400) [pid = 3752] [serial = 40] [outer = 0FB05000] 03:10:51 INFO - PROCESS | 3752 | 1483614651050 Marionette DEBUG loaded listener.js 03:10:51 INFO - PROCESS | 3752 | ++DOMWINDOW == 41 (0FBB1800) [pid = 3752] [serial = 41] [outer = 0FB05000] 03:10:51 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:10:51 INFO - PROCESS | 3752 | --DOCSHELL 1288BC00 == 12 [pid = 3752] [id = 4] 03:10:52 INFO - PROCESS | 3752 | 1483614652931 Marionette TRACE conn4 <- [1,24,null,{"value":["/WebCryptoAPI/encrypt_decrypt/aes_gcm.worker",0,null,null,[["AES-GCM 128-bit key, 32-bit tag",0,{},{}],["AES-GCM 128-bit key, no additional data, 32-bit tag",0,{},{}],["AES-GCM 128-bit key, 64-bit tag",0,{},{}],["AES-GCM 128-bit key, no additional data, 64-bit tag",0,{},{}],["AES-GCM 128-bit key, 96-bit tag",0,{},{}],["AES-GCM 128-bit key, no additional data, 96-bit tag",0,{},{}],["AES-GCM 128-bit key, 104-bit tag",0,{},{}],["AES-GCM 128-bit key, no additional data, 104-bit tag",0,{},{}],["AES-GCM 128-bit key, 112-bit tag",0,{},{}],["AES-GCM 128-bit key, no additional data, 112-bit tag",0,{},{}],["AES-GCM 128-bit key, 120-bit tag",0,{},{}],["AES-GCM 128-bit key, no additional data, 120-bit tag",0,{},{}],["AES-GCM 128-bit key, 128-bit tag",0,{},{}],["AES-GCM 128-bit key, no additional data, 128-bit tag",0,{},{}],["AES-GCM 192-bit key, 32-bit tag",0,{},{}],["AES-GCM 192-bit key, no additional data, 32-bit tag",0,{},{}],["AES-GCM 192-bit key, 64-bit tag",0,{},{}],["AES-GCM 192-bit key, no additional data, 64-bit tag",0,{},{}],["AES-GCM 192-bit key, 96-bit tag",0,{},{}],["AES-GCM 192-bit key, no additional data, 96-bit tag",0,{},{}],["AES-GCM 192-bit key, 104-bit tag",0,{},{}],["AES-GCM 192-bit key, no additional data, 104-bit tag",0,{},{}],["AES-GCM 192-bit key, 112-bit tag",0,{},{}],["AES-GCM 192-bit key, no additional data, 112-bit tag",0,{},{}],["AES-GCM 192-bit key, 120-bit tag",0,{},{}],["AES-GCM 192-bit key, no additional data, 120-bit tag",0,{},{}],["AES-GCM 192-bit key, 128-bit tag",0,{},{}],["AES-GCM 192-bit key, no additional data, 128-bit tag",0,{},{}],["AES-GCM 256-bit key, 32-bit tag",0,{},{}],["AES-GCM 256-bit key, no additional data, 32-bit tag",0,{},{}],["AES-GCM 256-bit key, 64-bit tag",0,{},{}],["AES-GCM 256-bit key, no additional data, 64-bit tag",0,{},{}],["AES-GCM 256-bit key, 96-bit tag",0,{},{}],["AES-GCM 256-bit key, no additional data, 96-bit tag",0,{},{}],["AES-GCM 256-bit key, 104-bit tag",0,{},{}],["AES-GCM 256-bit key, no additional data, 104-bit tag",0,{},{}],["AES-GCM 256-bit key, 112-bit tag",0,{},{}],["AES-GCM 256-bit key, no additional data, 112-bit tag",0,{},{}],["AES-GCM 256-bit key, 120-bit tag",0,{},{}],["AES-GCM 256-bit key, no additional data, 120-bit tag",0,{},{}],["AES-GCM 256-bit key, 128-bit tag",0,{},{}],["AES-GCM 256-bit key, no additional data, 128-bit tag",0,{},{}],["AES-GCM 128-bit key, 32-bit tag with altered plaintext",0,{},{}],["AES-GCM 128-bit key, no additional data, 32-bit tag with altered plaintext",0,{},{}],["AES-GCM 128-bit key, 64-bit tag with altered plaintext",0,{},{}],["AES-GCM 128-bit key, no additional data, 64-bit tag with altered plaintext",0,{},{}],["AES-GCM 128-bit key, 96-bit tag with altered plaintext",0,{},{}],["AES-GCM 128-bit key, no additional data, 96-bit tag with altered plaintext",0,{},{}],["AES-GCM 128-bit key, 104-bit tag with altered plaintext",0,{},{}],["AES-GCM 128-bit key, no additional data, 104-bit tag with altered plaintext",0,{},{}],["AES-GCM 128-bit key, 112-bit tag with altered plaintext",0,{},{}],["AES-GCM 128-bit key, no additional data, 112-bit tag with altered plaintext",0,{},{}],["AES-GCM 128-bit key, 120-bit tag with altered plaintext",0,{},{}],["AES-GCM 128-bit key, no additional data, 120-bit tag with altered plaintext",0,{},{}],["AES-GCM 128-bit key, 128-bit tag with altered plaintext",0,{},{}],["AES-GCM 128-bit key, no additional data, 128-bit tag with altered plaintext",0,{},{}],["AES-GCM 192-bit key, 32-bit tag with altered plaintext",0,{},{}],["AES-GCM 192-bit key, no additional data, 32-bit tag with altered plaintext",0,{},{}],["AES-GCM 192-bit key, 64-bit tag with altered plaintext",0,{},{}],["AES-GCM 192-bit key, no additional data, 64-bit tag with altered plaintext",0,{},{}],["AES-GCM 192-bit key, 96-bit tag with altered plaintext",0,{},{}],["AES-GCM 192-bit key, no additional data, 96-bit tag with altered plaintext",0,{},{}],["AES-GCM 192-bit key, 104-bit tag with altered plaintext",0,{},{}],["AES-GCM 192-bit key, no additional data, 104-bit tag with altered plaintext",0,{},{}],["AES-GCM 192-bit key, 112-bit tag with altered plaintext",0,{},{}],["AES-GCM 192-bit key, no additional data, 112-bit tag with altered plaintext",0,{},{}],["AES-GCM 192-bit key, 120-bit tag with altered plaintext",0,{},{}],["AES-GCM 192-bit key, no additional data, 120-bit tag with altered plaintext",0,{},{}],["AES-GCM 192-bit key, 128-bit tag with altered plaintext",0,{},{}],["AES-GCM 192-bit key, no additional data, 128-bit tag with altered plaintext",0,{},{}],["AES-GCM 256-bit key, 32-bit tag with altered plaintext",0,{},{}],["AES-GCM 256-bit key, no additional data, 32-bit tag with altered plaintext",0,{},{}],["AES-GCM 256-bit key, 64-bit tag with altered plaintext",0,{},{}],["AES-GCM 256-bit key, no additional data, 64-bit tag with altered plaintext",0,{},{}],["AES-GCM 256-bit key, 96-bit tag with altered plaintext",0,{},{}],["AES-GCM 256-bit key, no additional data, 96-bit tag with altered plaintext",0,{},{}],["AES-GCM 256-bit key, 104-bit tag with altered plaintext",0,{},{}],["AES-GCM 256-bit key, no additional data, 104-bit tag with altered plaintext",0,{},{}],["AES-GCM 256-bit key, 112-bit tag with altered plaintext",0,{},{}],["AES-GCM 256-bit key, no additional data, 112-bit tag with altered plaintext",0,{},{}],["AES-GCM 256-bit key, 120-bit tag with altered plaintext",0,{},{}],["AES-GCM 256-bit key, no additional data, 120-bit tag with altered plaintext",0,{},{}],["AES-GCM 256-bit key, 128-bit tag with altered plaintext",0,{},{}],["AES-GCM 256-bit key, no additional data, 128-bit tag with altered plaintext",0,{},{}],["AES-GCM 128-bit key, 32-bit tag decryption",0,{},{}],["AES-GCM 128-bit key, no additional data, 32-bit tag decryption",0,{},{}],["AES-GCM 128-bit key, 64-bit tag decryption",0,{},{}],["AES-GCM 128-bit key, no additional data, 64-bit tag decryption",0,{},{}],["AES-GCM 128-bit key, 96-bit tag decryption",0,{},{}],["AES-GCM 128-bit key, no additional data, 96-bit tag decryption",0,{},{}],["AES-GCM 128-bit key, 104-bit tag decryption",0,{},{}],["AES-GCM 128-bit key, no additional data, 104-bit tag decryption",0,{},{}],["AES-GCM 128-bit key, 112-bit tag decryption",0,{},{}],["AES-GCM 128-bit key, no additional data, 112-bit tag decryption",0,{},{}],["AES-GCM 128-bit key, 120-bit tag decryption",0,{},{}],["AES-GCM 128-bit key, no additional data, 120-bit tag decryption",0,{},{}],["AES-GCM 128-bit key, 128-bit tag decryption",0,{},{}],["AES-GCM 128-bit key, no additional data, 128-bit tag decryption",0,{},{}],["AES-GCM 192-bit key, 32-bit tag decryption",0,{},{}],["AES-GCM 192-bit key, no additional data, 32-bit tag decryption",0,{},{}],["AES-GCM 192-bit key, 64-bit tag decryption",0,{},{}],["AES-GCM 192-bit key, no additional data, 64-bit tag decryption",0,{},{}],["AES-GCM 192-bit key, 96-bit tag decryption",0,{},{}],["AES-GCM 192-bit key, no additional data, 96-bit tag decryption",0,{},{}],["AES-GCM 192-bit key, 104-bit tag decryption",0,{},{}],["AES-GCM 192-bit key, no additional data, 104-bit tag decryption",0,{},{}],["AES-GCM 192-bit key, 112-bit tag decryption",0,{},{}],["AES-GCM 192-bit key, no additional data, 112-bit tag decryption",0,{},{}],["AES-GCM 192-bit key, 120-bit tag decryption",0,{},{}],["AES-GCM 192-bit key, no additional data, 120-bit tag decryption",0,{},{}],["AES-GCM 192-bit key, 128-bit tag decryption",0,{},{}],["AES-GCM 192-bit key, no additional data, 128-bit tag decryption",0,{},{}],["AES-GCM 256-bit key, 32-bit tag decryption",0,{},{}],["AES-GCM 256-bit key, no additional data, 32-bit tag decryption",0,{},{}],["AES-GCM 256-bit key, 64-bit tag decryption",0,{},{}],["AES-GCM 256-bit key, no additional data, 64-bit tag decryption",0,{},{}],["AES-GCM 256-bit key, 96-bit tag decryption",0,{},{}],["AES-GCM 256-bit key, no additional data, 96-bit tag decryption",0,{},{}],["AES-GCM 256-bit key, 104-bit tag decryption",0,{},{}],["AES-GCM 256-bit key, no additional data, 104-bit tag decryption",0,{},{}],["AES-GCM 256-bit key, 112-bit tag decryption",0,{},{}],["AES-GCM 256-bit key, no additional data, 112-bit tag decryption",0,{},{}],["AES-GCM 256-bit key, 120-bit tag decryption",0,{},{}],["AES-GCM 256-bit key, no additional data, 120-bit tag decryption",0,{},{}],["AES-GCM 256-bit key, 128-bit tag decryption",0,{},{}],["AES-GCM 256-bit key, no additional data, 128-bit tag decryption",0,{},{}],["AES-GCM 128-bit key, 32-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 128-bit key, no additional data, 32-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 128-bit key, 64-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 128-bit key, no additional data, 64-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 128-bit key, 96-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 128-bit key, no additional data, 96-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 128-bit key, 104-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 128-bit key, no additional data, 104-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 128-bit key, 112-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 128-bit key, no additional data, 112-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 128-bit key, 120-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 128-bit key, no additional data, 120-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 128-bit key, 128-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 128-bit key, no additional data, 128-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 192-bit key, 32-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 192-bit key, no additional data, 32-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 192-bit key, 64-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 192-bit key, no additional data, 64-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 192-bit key, 96-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 192-bit key, no additional data, 96-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 192-bit key, 104-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 192-bit key, no additional data, 104-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 192-bit key, 112-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 192-bit key, no additional data, 112-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 192-bit key, 120-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 192-bit key, no additional data, 120-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 192-bit key, 128-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 192-bit key, no additional data, 128-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 256-bit key, 32-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 256-bit key, no additional data, 32-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 256-bit key, 64-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 256-bit key, no additional data, 64-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 256-bit key, 96-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 256-bit key, no additional data, 96-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 256-bit key, 104-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 256-bit key, no additional data, 104-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 256-bit key, 112-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 256-bit key, no additional data, 112-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 256-bit key, 120-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 256-bit key, no additional data, 120-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 256-bit key, 128-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 256-bit key, no additional data, 128-bit tag decryption with altered ciphertext",0,{},{}],["AES-GCM 128-bit key, 32-bit tag without encrypt usage",0,{},{}],["AES-GCM 128-bit key, no additional data, 32-bit tag without encrypt usage",0,{},{}],["AES-GCM 128-bit key, 64-bit tag without encrypt usage",0,{},{}],["AES-GCM 128-bit key, no additional data, 64-bit tag without encrypt usage",0,{},{}],["AES-GCM 128-bit key, 96-bit tag without encrypt usage",0,{},{}],["AES-GCM 128-bit key, no additional data, 96-bit tag without encrypt usage",0,{},{}],["AES-GCM 128-bit key, 104-bit tag without encrypt usage",0,{},{}],["AES-GCM 128-bit key, no additional data, 104-bit tag without encrypt usage",0,{},{}],["AES-GCM 128-bit key, 112-bit tag without encrypt usage",0,{},{}],["AES-GCM 128-bit key, no additional data, 112-bit tag without encrypt usage",0,{},{}],["AES-GCM 128-bit key, 120-bit tag without encrypt usage",0,{},{}],["AES-GCM 128-bit key, no additional data, 120-bit tag without encrypt usage",0,{},{}],["AES-GCM 128-bit key, 128-bit tag without encrypt usage",0,{},{}],["AES-GCM 128-bit key, no additional data, 128-bit tag without encrypt usage",0,{},{}],["AES-GCM 192-bit key, 32-bit tag without encrypt usage",0,{},{}],["AES-GCM 192-bit key, no additional data, 32-bit tag without encrypt usage",0,{},{}],["AES-GCM 192-bit key, 64-bit tag without encrypt usage",0,{},{}],["AES-GCM 192-bit key, no additional data, 64-bit tag without encrypt usage",0,{},{}],["AES-GCM 192-bit key, 96-bit tag without encrypt usage",0,{},{}],["AES-GCM 192-bit key, no additional data, 96-bit tag without encrypt usage",0,{},{}],["AES-GCM 192-bit key, 104-bit tag without encrypt usage",0,{},{}],["AES-GCM 192-bit key, no additional data, 104-bit tag without encrypt usage",0,{},{}],["AES-GCM 192-bit key, 112-bit tag without encrypt usage",0,{},{}],["AES-GCM 192-bit key, no additional data, 112-bit tag without encrypt usage",0,{},{}],["AES-GCM 192-bit key, 120-bit tag without encrypt usage",0,{},{}],["AES-GCM 192-bit key, no additional data, 120-bit tag without encrypt usage",0,{},{}],["AES-GCM 192-bit key, 128-bit tag without encrypt usage",0,{},{}],["AES-GCM 192-bit key, no additional data, 128-bit tag without encrypt usage",0,{},{}],["AES-GCM 256-bit key, 32-bit tag without encrypt usage",0,{},{}],["AES-GCM 256-bit key, no additional data, 32-bit tag without encrypt usage",0,{},{}],["AES-GCM 256-bit key, 64-bit tag without encrypt usage",0,{},{}],["AES-GCM 256-bit key, no additional data, 64-bit tag without encrypt usage",0,{},{}],["AES-GCM 256-bit key, 96-bit tag without encrypt usage",0,{},{}],["AES-GCM 256-bit key, no additional data, 96-bit tag without encrypt usage",0,{},{}],["AES-GCM 256-bit key, 104-bit tag without encrypt usage",0,{},{}],["AES-GCM 256-bit key, no additional data, 104-bit tag without encrypt usage",0,{},{}],["AES-GCM 256-bit key, 112-bit tag without encrypt usage",0,{},{}],["AES-GCM 256-bit key, no additional data, 112-bit tag without encrypt usage",0,{},{}],["AES-GCM 256-bit key, 120-bit tag without encrypt usage",0,{},{}],["AES-GCM 256-bit key, no additional data, 120-bit tag without encrypt usage",0,{},{}],["AES-GCM 256-bit key, 128-bit tag without encrypt usage",0,{},{}],["AES-GCM 256-bit key, no additional data, 128-bit tag without encrypt usage",0,{},{}],["AES-GCM 128-bit key, 32-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 128-bit key, no additional data, 32-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 128-bit key, 64-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 128-bit key, no additional data, 64-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 128-bit key, 96-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 128-bit key, no additional data, 96-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 128-bit key, 104-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 128-bit key, no additional data, 104-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 128-bit key, 112-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 128-bit key, no additional data, 112-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 128-bit key, 120-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 128-bit key, no additional data, 120-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 128-bit key, 128-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 128-bit key, no additional data, 128-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 192-bit key, 32-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 192-bit key, no additional data, 32-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 192-bit key, 64-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 192-bit key, no additional data, 64-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 192-bit key, 96-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 192-bit key, no additional data, 96-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 192-bit key, 104-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 192-bit key, no additional data, 104-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 192-bit key, 112-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 192-bit key, no additional data, 112-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 192-bit key, 120-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 192-bit key, no additional data, 120-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 192-bit key, 128-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 192-bit key, no additional data, 128-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 256-bit key, 32-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 256-bit key, no additional data, 32-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 256-bit key, 64-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 256-bit key, no additional data, 64-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 256-bit key, 96-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 256-bit key, no additional data, 96-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 256-bit key, 104-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 256-bit key, no additional data, 104-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 256-bit key, 112-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 256-bit key, no additional data, 112-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 256-bit key, 120-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 256-bit key, no additional data, 120-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 256-bit key, 128-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 256-bit key, no additional data, 128-bit tag with mismatched key and algorithm",0,{},{}],["AES-GCM 128-bit key, 32-bit tag without decrypt usage",0,{},{}],["AES-GCM 128-bit key, no additional data, 32-bit tag without decrypt usage",0,{},{}],["AES-GCM 128-bit key, 64-bit tag without decrypt usage",0,{},{}],["AES-GCM 128-bit key, no additional data, 64-bit tag without decrypt usage",0,{},{}],["AES-GCM 128-bit key, 96-bit tag without decrypt usage",0,{},{}],["AES-GCM 128-bit key, no additional data, 96-bit tag without decrypt usage",0,{},{}],["AES-GCM 128-bit key, 104-bit tag without decrypt usage",0,{},{}],["AES-GCM 128-bit key, no additional data, 104-bit tag without decrypt usage",0,{},{}],["AES-GCM 128-bit key, 112-bit tag without decrypt usage",0,{},{}],["AES-GCM 128-bit key, no additional data, 112-bit tag without decrypt usage",0,{},{}],["AES-GCM 128-bit key, 120-bit tag without decrypt usage",0,{},{}],["AES-GCM 128-bit key, no additional data, 120-bit tag without decrypt usage",0,{},{}],["AES-GCM 128-bit key, 128-bit tag without decrypt usage",0,{},{}],["AES-GCM 128-bit key, no additional data, 128-bit tag without decrypt usage",0,{},{}],["AES-GCM 192-bit key, 32-bit tag without decrypt usage",0,{},{}],["AES-GCM 192-bit key, no additional data, 32-bit tag without decrypt usage",0,{},{}],["AES-GCM 192-bit key, 64-bit tag without decrypt usage",0,{},{}],["AES-GCM 192-bit key, no additional data, 64-bit tag without decrypt usage",0,{},{}],["AES-GCM 192-bit key, 96-bit tag without decrypt usage",0,{},{}],["AES-GCM 192-bit key, no additional data, 96-bit tag without decrypt usage",0,{},{}],["AES-GCM 192-bit key, 104-bit tag without decrypt usage",0,{},{}],["AES-GCM 192-bit key, no additional data, 104-bit tag without decrypt usage",0,{},{}],["AES-GCM 192-bit key, 112-bit tag without decrypt usage",0,{},{}],["AES-GCM 192-bit key, no additional data, 112-bit tag without decrypt usage",0,{},{}],["AES-GCM 192-bit key, 120-bit tag without decrypt usage",0,{},{}],["AES-GCM 192-bit key, no additional data, 120-bit tag without decrypt usage",0,{},{}],["AES-GCM 192-bit key, 128-bit tag without decrypt usage",0,{},{}],["AES-GCM 192-bit key, no additional data, 128-bit tag without decrypt usage",0,{},{}],["AES-GCM 256-bit key, 32-bit tag without decrypt usage",0,{},{}],["AES-GCM 256-bit key, no additional data, 32-bit tag without decrypt usage",0,{},{}],["AES-GCM 256-bit key, 64-bit tag without decrypt usage",0,{},{}],["AES-GCM 256-bit key, no additional data, 64-bit tag without decrypt usage",0,{},{}],["AES-GCM 256-bit key, 96-bit tag without decrypt usage",0,{},{}],["AES-GCM 256-bit key, no additional data, 96-bit tag without decrypt usage",0,{},{}],["AES-GCM 256-bit key, 104-bit tag without decrypt usage",0,{},{}],["AES-GCM 256-bit key, no additional data, 104-bit tag without decrypt usage",0,{},{}],["AES-GCM 256-bit key, 112-bit tag without decrypt usage",0,{},{}],["AES-GCM 256-bit key, no additional data, 112-bit tag without decrypt usage",0,{},{}],["AES-GCM 256-bit key, 120-bit tag without decrypt usage",0,{},{}],["AES-GCM 256-bit key, no additional data, 120-bit tag without decrypt usage",0,{},{}],["AES-GCM 256-bit key, 128-bit tag without decrypt usage",0,{},{}],["AES-GCM 256-bit key, no additional data, 128-bit tag without decrypt usage",0,{},{}],["AES-GCM 128-bit key, illegal tag length 24-bits",1,"assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\"","run_test/ [0,25,"getWindowHandle",null] 03:10:53 INFO - PROCESS | 3752 | 1483614653106 Marionette TRACE conn4 <- [1,25,null,{"value":"12"}] 03:10:53 INFO - TEST-START | /WebCryptoAPI/encrypt_decrypt/rsa.worker 03:10:53 INFO - PROCESS | 3752 | 1483614653114 Marionette TRACE conn4 -> [0,26,"timeouts",{"script":35000}] 03:10:53 INFO - PROCESS | 3752 | 1483614653118 Marionette TRACE conn4 <- [1,26,null,{}] 03:10:53 INFO - PROCESS | 3752 | 1483614653123 Marionette TRACE conn4 -> [0,27,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:10:53 INFO - PROCESS | 3752 | 1483614653259 Marionette TRACE conn4 <- [1,27,null,{"value":null}] 03:10:53 INFO - PROCESS | 3752 | 1483614653267 Marionette TRACE conn4 -> [0,28,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/encrypt_decrypt/rsa.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/encrypt_decrypt/rsa.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:10:53 INFO - PROCESS | 3752 | ++DOCSHELL 11107800 == 13 [pid = 3752] [id = 15] 03:10:53 INFO - PROCESS | 3752 | ++DOMWINDOW == 42 (1110BC00) [pid = 3752] [serial = 42] [outer = 00000000] 03:10:53 INFO - PROCESS | 3752 | ++DOMWINDOW == 43 (12BF4C00) [pid = 3752] [serial = 43] [outer = 1110BC00] 03:10:53 INFO - PROCESS | 3752 | 1483614653325 Marionette DEBUG loaded listener.js 03:10:53 INFO - PROCESS | 3752 | ++DOMWINDOW == 44 (12BFB800) [pid = 3752] [serial = 44] [outer = 1110BC00] 03:10:53 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:10:54 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:10:54 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:10:54 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:10:54 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:10:54 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:10:54 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:10:54 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:10:54 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:10:54 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:10:54 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:10:54 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:10:54 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:10:54 INFO - PROCESS | 3752 | 1483614654921 Marionette TRACE conn4 <- [1,28,null,{"value":["/WebCryptoAPI/encrypt_decrypt/rsa.worker",0,null,null,[["RSA-OAEP with SHA-1 and no label decryption",0,{},{}],["RSA-OAEP with SHA-256 and no label decryption",0,{},{}],["RSA-OAEP with SHA-384 and no label decryption",0,{},{}],["RSA-OAEP with SHA-512 and no label decryption",0,{},{}],["RSA-OAEP with SHA-1 and empty label decryption",0,{},{}],["RSA-OAEP with SHA-256 and empty label decryption",0,{},{}],["RSA-OAEP with SHA-384 and empty label decryption",0,{},{}],["RSA-OAEP with SHA-512 and empty label decryption",0,{},{}],["RSA-OAEP with SHA-1 and a label decryption",0,{},{}],["RSA-OAEP with SHA-256 and a label decryption",0,{},{}],["RSA-OAEP with SHA-384 and a label decryption",0,{},{}],["RSA-OAEP with SHA-512 and a label decryption",0,{},{}],["RSA-OAEP with SHA-1 and no label decryption with altered ciphertext",0,{},{}],["RSA-OAEP with SHA-256 and no label decryption with altered ciphertext",0,{},{}],["RSA-OAEP with SHA-384 and no label decryption with altered ciphertext",0,{},{}],["RSA-OAEP with SHA-512 and no label decryption with altered ciphertext",0,{},{}],["RSA-OAEP with SHA-1 and empty label decryption with altered ciphertext",0,{},{}],["RSA-OAEP with SHA-256 and empty label decryption with altered ciphertext",0,{},{}],["RSA-OAEP with SHA-384 and empty label decryption with altered ciphertext",0,{},{}],["RSA-OAEP with SHA-512 and empty label decryption with altered ciphertext",0,{},{}],["RSA-OAEP with SHA-1 and a label decryption with altered ciphertext",0,{},{}],["RSA-OAEP with SHA-256 and a label decryption with altered ciphertext",0,{},{}],["RSA-OAEP with SHA-384 and a label decryption with altered ciphertext",0,{},{}],["RSA-OAEP with SHA-512 and a label decryption with altered ciphertext",0,{},{}],["RSA-OAEP with SHA-1 and no label using publicKey to decrypt",0,{},{}],["RSA-OAEP with SHA-256 and no label using publicKey to decrypt",0,{},{}],["RSA-OAEP with SHA-384 and no label using publicKey to decrypt",0,{},{}],["RSA-OAEP with SHA-512 and no label using publicKey to decrypt",0,{},{}],["RSA-OAEP with SHA-1 and empty label using publicKey to decrypt",0,{},{}],["RSA-OAEP with SHA-256 and empty label using publicKey to decrypt",0,{},{}],["RSA-OAEP with SHA-384 and empty label using publicKey to decrypt",0,{},{}],["RSA-OAEP with SHA-512 and empty label using publicKey to decrypt",0,{},{}],["RSA-OAEP with SHA-1 and a label using publicKey to decrypt",0,{},{}],["RSA-OAEP with SHA-256 and a label using publicKey to decrypt",0,{},{}],["RSA-OAEP with SHA-384 and a label using publicKey to decrypt",0,{},{}],["RSA-OAEP with SHA-512 and a label using publicKey to decrypt",0,{},{}],["RSA-OAEP with SHA-1 and no label no decrypt usage",0,{},{}],["RSA-OAEP with SHA-256 and no label no decrypt usage",0,{},{}],["RSA-OAEP with SHA-384 and no label no decrypt usage",0,{},{}],["RSA-OAEP with SHA-512 and no label no decrypt usage",0,{},{}],["RSA-OAEP with SHA-1 and empty label no decrypt usage",0,{},{}],["RSA-OAEP with SHA-256 and empty label no decrypt usage",0,{},{}],["RSA-OAEP with SHA-384 and empty label no decrypt usage",0,{},{}],["RSA-OAEP with SHA-512 and empty label no decrypt usage",0,{},{}],["RSA-OAEP with SHA-1 and a label no decrypt usage",0,{},{}],["RSA-OAEP with SHA-256 and a label no decrypt usage",0,{},{}],["RSA-OAEP with SHA-384 and a label no decrypt usage",0,{},{}],["RSA-OAEP with SHA-512 and a label no decrypt usage",0,{},{}],["RSA-OAEP with SHA-1 and no label with altered plaintext",0,{},{}],["RSA-OAEP with SHA-256 and no label with altered plaintext",0,{},{}],["RSA-OAEP with SHA-384 and no label with altered plaintext",0,{},{}],["RSA-OAEP with SHA-512 and no label with altered plaintext",0,{},{}],["RSA-OAEP with SHA-1 and empty label with altered plaintext",0,{},{}],["RSA-OAEP with SHA-256 and empty label with altered plaintext",0,{},{}],["RSA-OAEP with SHA-384 and empty label with altered plaintext",0,{},{}],["RSA-OAEP with SHA-512 and empty label with altered plaintext",0,{},{}],["RSA-OAEP with SHA-1 and a label with altered plaintext",0,{},{}],["RSA-OAEP with SHA-256 and a label with altered plaintext",0,{},{}],["RSA-OAEP with SHA-384 and a label with altered plaintext",0,{},{}],["RSA-OAEP with SHA-512 and a label with altered plaintext",0,{},{}],["RSA-OAEP with SHA-1 and no label",0,{},{}],["RSA-OAEP with SHA-256 and no label",0,{},{}],["RSA-OAEP with SHA-384 and no label",0,{},{}],["RSA-OAEP with SHA-512 and no label",0,{},{}],["RSA-OAEP with SHA-1 and empty label",0,{},{}],["RSA-OAEP with SHA-256 and empty label",0,{},{}],["RSA-OAEP with SHA-384 and empty label",0,{},{}],["RSA-OAEP with SHA-512 and empty label",0,{},{}],["RSA-OAEP with SHA-1 and a label",0,{},{}],["RSA-OAEP with SHA-256 and a label",0,{},{}],["RSA-OAEP with SHA-384 and a label",0,{},{}],["RSA-OAEP with SHA-512 and a label",0,{},{}],["RSA-OAEP with SHA-1 and no label too long plaintext",0,{},{}],["RSA-OAEP with SHA-256 and no label too long plaintext",0,{},{}],["RSA-OAEP with SHA-384 and no label too long plaintext",0,{},{}],["RSA-OAEP with SHA-512 and no label too long plaintext",0,{},{}],["RSA-OAEP with SHA-1 and empty label too long plaintext",0,{},{}],["RSA-OAEP with SHA-256 and empty label too long plaintext",0,{},{}],["RSA-OAEP with SHA-384 and empty label too long plaintext",0,{},{}],["RSA-OAEP with SHA-512 and empty label too long plaintext",0,{},{}],["RSA-OAEP with SHA-1 and a label too long plaintext",0,{},{}],["RSA-OAEP with SHA-256 and a label too long plaintext",0,{},{}],["RSA-OAEP with SHA-384 and a label too long plaintext",0,{},{}],["RSA-OAEP with SHA-512 and a label too long plaintext",0,{},{}],["RSA-OAEP with SHA-1 and no label using privateKey to encrypt",0,{},{}],["RSA-OAEP with SHA-256 and no label using privateKey to encrypt",0,{},{}],["RSA-OAEP with SHA-384 and no label using privateKey to encrypt",0,{},{}],["RSA-OAEP with SHA-512 and no label using privateKey to encrypt",0,{},{}],["RSA-OAEP with SHA-1 and empty label using privateKey to encrypt",0,{},{}],["RSA-OAEP with SHA-256 and empty label using privateKey to encrypt",0,{},{}],["RSA-OAEP with SHA-384 and empty label using privateKey to encrypt",0,{},{}],["RSA-OAEP with SHA-512 and empty label using privateKey to encrypt",0,{},{}],["RSA-OAEP with SHA-1 and a label using privateKey to encrypt",0,{},{}],["RSA-OAEP with SHA-256 and a label using privateKey to encrypt",0,{},{}],["RSA-OAEP with SHA-384 and a label using privateKey to encrypt",0,{},{}],["RSA-OAEP with SHA-512 and a label using privateKey to encrypt",0,{},{}],["RSA-OAEP with SHA-1 and no label no encrypt usage",0,{},{}],["RSA-OAEP with SHA-256 and no label no encrypt usage",0,{},{}],["RSA-OAEP with SHA-384 and no label no encrypt usage",0,{},{}],["RSA-OAEP with SHA-512 and no label no encrypt usage",0,{},{}],["RSA-OAEP with SHA-1 and empty label no encrypt usage",0,{},{}],["RSA-OAEP with SHA-256 and empty label no encrypt usage",0,{},{}],["RSA-OAEP with SHA-384 and empty label no encrypt usage",0,{},{}],["RSA-OAEP with SHA-512 and empty label no encrypt usage",0,{},{}],["RSA-OAEP with SHA-1 and a label no encrypt usage",0,{},{}],["RSA-OAEP with SHA-256 and a label no encrypt usage",0,{},{}],["RSA-OAEP with SHA-384 and a label no encrypt usage",0,{},{}],["RSA-OAEP with SHA-512 and a label no encrypt usage",0,{},{}]]]}] 03:10:54 INFO - ............................................................................................................ 03:10:54 INFO - TEST-OK | /WebCryptoAPI/encrypt_decrypt/rsa.worker | took 1884ms 03:10:54 INFO - PROCESS | 3752 | 1483614654992 Marionette TRACE conn4 -> [0,29,"getWindowHandle",null] 03:10:54 INFO - TEST-START | /WebCryptoAPI/encrypt_decrypt/test_aes_cbc.html 03:10:54 INFO - PROCESS | 3752 | 1483614654995 Marionette TRACE conn4 <- [1,29,null,{"value":"12"}] 03:10:54 INFO - PROCESS | 3752 | 1483614654999 Marionette TRACE conn4 -> [0,30,"timeouts",{"script":185000}] 03:10:54 INFO - PROCESS | 3752 | 1483614655004 Marionette TRACE conn4 <- [1,30,null,{}] 03:10:55 INFO - PROCESS | 3752 | 1483614655016 Marionette TRACE conn4 -> [0,31,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:10:55 INFO - PROCESS | 3752 | 1483614655121 Marionette TRACE conn4 <- [1,31,null,{"value":null}] 03:10:55 INFO - PROCESS | 3752 | 1483614655129 Marionette TRACE conn4 -> [0,32,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/encrypt_decrypt/test_aes_cbc.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/encrypt_decrypt/test_aes_cbc.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:10:55 INFO - PROCESS | 3752 | ++DOCSHELL 13D7BC00 == 14 [pid = 3752] [id = 16] 03:10:55 INFO - PROCESS | 3752 | ++DOMWINDOW == 45 (13D7C000) [pid = 3752] [serial = 45] [outer = 00000000] 03:10:55 INFO - PROCESS | 3752 | ++DOMWINDOW == 46 (14775800) [pid = 3752] [serial = 46] [outer = 13D7C000] 03:10:55 INFO - PROCESS | 3752 | 1483614655187 Marionette DEBUG loaded listener.js 03:10:55 INFO - PROCESS | 3752 | ++DOMWINDOW == 47 (14499800) [pid = 3752] [serial = 47] [outer = 13D7C000] 03:10:55 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFE: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:55 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFE: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:55 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFE: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:55 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFE: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:55 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFE: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:55 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFE: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:55 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFE: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:55 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFE: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:55 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFE: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:55 INFO - PROCESS | 3752 | 1483614655797 Marionette TRACE conn4 <- [1,32,null,{"value":["/WebCryptoAPI/encrypt_decrypt/test_aes_cbc.html",0,null,null,[["AES-CBC 128-bit key",0,null,null],["AES-CBC 192-bit key",0,null,null],["AES-CBC 256-bit key",0,null,null],["AES-CBC 128-bit key with altered plaintext",0,null,null],["AES-CBC 192-bit key with altered plaintext",0,null,null],["AES-CBC 256-bit key with altered plaintext",0,null,null],["AES-CBC 128-bit key decryption",0,null,null],["AES-CBC 192-bit key decryption",0,null,null],["AES-CBC 256-bit key decryption",0,null,null],["AES-CBC 128-bit key decryption with altered ciphertext",0,null,null],["AES-CBC 192-bit key decryption with altered ciphertext",0,null,null],["AES-CBC 256-bit key decryption with altered ciphertext",0,null,null],["AES-CBC 128-bit key without encrypt usage",0,null,null],["AES-CBC 192-bit key without encrypt usage",0,null,null],["AES-CBC 256-bit key without encrypt usage",0,null,null],["AES-CBC 128-bit key with mismatched key and algorithm",0,null,null],["AES-CBC 192-bit key with mismatched key and algorithm",0,null,null],["AES-CBC 256-bit key with mismatched key and algorithm",0,null,null],["AES-CBC 128-bit key without decrypt usage",0,null,null],["AES-CBC 192-bit key without decrypt usage",0,null,null],["AES-CBC 256-bit key without decrypt usage",0,null,null],["AES-CBC 128-bit key, 64-bit IV",1,"assert_equals: Should throw an OperationError instead of Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/ [0,33,"getWindowHandle",null] 03:10:55 INFO - PROCESS | 3752 | 1483614655832 Marionette TRACE conn4 <- [1,33,null,{"value":"12"}] 03:10:55 INFO - TEST-START | /WebCryptoAPI/encrypt_decrypt/test_aes_ctr.html 03:10:55 INFO - PROCESS | 3752 | 1483614655836 Marionette TRACE conn4 -> [0,34,"timeouts",{"script":185000}] 03:10:55 INFO - PROCESS | 3752 | 1483614655838 Marionette TRACE conn4 <- [1,34,null,{}] 03:10:55 INFO - PROCESS | 3752 | 1483614655846 Marionette TRACE conn4 -> [0,35,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:10:55 INFO - PROCESS | 3752 | 1483614655931 Marionette TRACE conn4 <- [1,35,null,{"value":null}] 03:10:55 INFO - PROCESS | 3752 | 1483614655938 Marionette TRACE conn4 -> [0,36,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/encrypt_decrypt/test_aes_ctr.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/encrypt_decrypt/test_aes_ctr.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:10:55 INFO - PROCESS | 3752 | ++DOCSHELL 1288E800 == 15 [pid = 3752] [id = 17] 03:10:55 INFO - PROCESS | 3752 | ++DOMWINDOW == 48 (1288FC00) [pid = 3752] [serial = 48] [outer = 00000000] 03:10:55 INFO - PROCESS | 3752 | ++DOMWINDOW == 49 (1441DC00) [pid = 3752] [serial = 49] [outer = 1288FC00] 03:10:55 INFO - PROCESS | 3752 | 1483614655995 Marionette DEBUG loaded listener.js 03:10:56 INFO - PROCESS | 3752 | ++DOMWINDOW == 50 (140C6000) [pid = 3752] [serial = 50] [outer = 1288FC00] 03:10:56 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:56 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:56 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:56 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:56 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:56 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:56 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:56 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:56 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:56 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:56 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:56 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FED: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 739 03:10:56 INFO - PROCESS | 3752 | 1483614656531 Marionette TRACE conn4 <- [1,36,null,{"value":["/WebCryptoAPI/encrypt_decrypt/test_aes_ctr.html",0,null,null,[["AES-CTR 128-bit key",0,null,null],["AES-CTR 192-bit key",0,null,null],["AES-CTR 256-bit key",0,null,null],["AES-CTR 128-bit key with altered plaintext",0,null,null],["AES-CTR 192-bit key with altered plaintext",0,null,null],["AES-CTR 256-bit key with altered plaintext",0,null,null],["AES-CTR 128-bit key decryption",0,null,null],["AES-CTR 192-bit key decryption",0,null,null],["AES-CTR 256-bit key decryption",0,null,null],["AES-CTR 128-bit key decryption with altered ciphertext",0,null,null],["AES-CTR 192-bit key decryption with altered ciphertext",0,null,null],["AES-CTR 256-bit key decryption with altered ciphertext",0,null,null],["AES-CTR 128-bit key without encrypt usage",0,null,null],["AES-CTR 192-bit key without encrypt usage",0,null,null],["AES-CTR 256-bit key without encrypt usage",0,null,null],["AES-CTR 128-bit key with mismatched key and algorithm",0,null,null],["AES-CTR 192-bit key with mismatched key and algorithm",0,null,null],["AES-CTR 256-bit key with mismatched key and algorithm",0,null,null],["AES-CTR 128-bit key without decrypt usage",0,null,null],["AES-CTR 192-bit key without decrypt usage",0,null,null],["AES-CTR 256-bit key without decrypt usage",0,null,null],["AES-CTR 128-bit key, 0-bit counter",0,null,null],["AES-CTR 128-bit key, 129-bit counter",0,null,null],["AES-CTR 192-bit key, 0-bit counter",0,null,null],["AES-CTR 192-bit key, 129-bit counter",0,null,null],["AES-CTR 256-bit key, 0-bit counter",0,null,null],["AES-CTR 256-bit key, 129-bit counter",0,null,null],["AES-CTR 128-bit key, 0-bit counter decryption",0,null,null],["AES-CTR 128-bit key, 129-bit counter decryption",0,null,null],["AES-CTR 192-bit key, 0-bit counter decryption",0,null,null],["AES-CTR 192-bit key, 129-bit counter decryption",0,null,null],["AES-CTR 256-bit key, 0-bit counter decryption",0,null,null],["AES-CTR 256-bit key, 129-bit counter decryption",0,null,null]]]}] 03:10:56 INFO - ................................. 03:10:56 INFO - TEST-OK | /WebCryptoAPI/encrypt_decrypt/test_aes_ctr.html | took 738ms 03:10:56 INFO - PROCESS | 3752 | 1483614656580 Marionette TRACE conn4 -> [0,37,"getWindowHandle",null] 03:10:56 INFO - PROCESS | 3752 | 1483614656564 Marionette TRACE conn4 <- [1,37,null,{"value":"12"}] 03:10:56 INFO - TEST-START | /WebCryptoAPI/encrypt_decrypt/test_aes_gcm.html 03:10:56 INFO - PROCESS | 3752 | 1483614656569 Marionette TRACE conn4 -> [0,38,"timeouts",{"script":185000}] 03:10:56 INFO - PROCESS | 3752 | 1483614656571 Marionette TRACE conn4 <- [1,38,null,{}] 03:10:56 INFO - PROCESS | 3752 | 1483614656575 Marionette TRACE conn4 -> [0,39,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:10:56 INFO - PROCESS | 3752 | 1483614656663 Marionette TRACE conn4 <- [1,39,null,{"value":null}] 03:10:56 INFO - PROCESS | 3752 | 1483614656670 Marionette TRACE conn4 -> [0,40,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/encrypt_decrypt/test_aes_gcm.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/encrypt_decrypt/test_aes_gcm.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:10:56 INFO - PROCESS | 3752 | ++DOCSHELL 16987800 == 16 [pid = 3752] [id = 18] 03:10:56 INFO - PROCESS | 3752 | ++DOMWINDOW == 51 (16989C00) [pid = 3752] [serial = 51] [outer = 00000000] 03:10:56 INFO - PROCESS | 3752 | ++DOMWINDOW == 52 (16F05C00) [pid = 3752] [serial = 52] [outer = 16989C00] 03:10:56 INFO - PROCESS | 3752 | 1483614656723 Marionette DEBUG loaded listener.js 03:10:56 INFO - PROCESS | 3752 | ++DOMWINDOW == 53 (16DDB000) [pid = 3752] [serial = 53] [outer = 16989C00] 03:10:58 INFO - PROCESS | 3752 | 1483614658140 Marionette TRACE conn4 <- [1,40,null,{"value":["/WebCryptoAPI/encrypt_decrypt/test_aes_gcm.html",0,null,null,[["AES-GCM 128-bit key, 32-bit tag",0,null,null],["AES-GCM 128-bit key, no additional data, 32-bit tag",0,null,null],["AES-GCM 128-bit key, 64-bit tag",0,null,null],["AES-GCM 128-bit key, no additional data, 64-bit tag",0,null,null],["AES-GCM 128-bit key, 96-bit tag",0,null,null],["AES-GCM 128-bit key, no additional data, 96-bit tag",0,null,null],["AES-GCM 128-bit key, 104-bit tag",0,null,null],["AES-GCM 128-bit key, no additional data, 104-bit tag",0,null,null],["AES-GCM 128-bit key, 112-bit tag",0,null,null],["AES-GCM 128-bit key, no additional data, 112-bit tag",0,null,null],["AES-GCM 128-bit key, 120-bit tag",0,null,null],["AES-GCM 128-bit key, no additional data, 120-bit tag",0,null,null],["AES-GCM 128-bit key, 128-bit tag",0,null,null],["AES-GCM 128-bit key, no additional data, 128-bit tag",0,null,null],["AES-GCM 192-bit key, 32-bit tag",0,null,null],["AES-GCM 192-bit key, no additional data, 32-bit tag",0,null,null],["AES-GCM 192-bit key, 64-bit tag",0,null,null],["AES-GCM 192-bit key, no additional data, 64-bit tag",0,null,null],["AES-GCM 192-bit key, 96-bit tag",0,null,null],["AES-GCM 192-bit key, no additional data, 96-bit tag",0,null,null],["AES-GCM 192-bit key, 104-bit tag",0,null,null],["AES-GCM 192-bit key, no additional data, 104-bit tag",0,null,null],["AES-GCM 192-bit key, 112-bit tag",0,null,null],["AES-GCM 192-bit key, no additional data, 112-bit tag",0,null,null],["AES-GCM 192-bit key, 120-bit tag",0,null,null],["AES-GCM 192-bit key, no additional data, 120-bit tag",0,null,null],["AES-GCM 192-bit key, 128-bit tag",0,null,null],["AES-GCM 192-bit key, no additional data, 128-bit tag",0,null,null],["AES-GCM 256-bit key, 32-bit tag",0,null,null],["AES-GCM 256-bit key, no additional data, 32-bit tag",0,null,null],["AES-GCM 256-bit key, 64-bit tag",0,null,null],["AES-GCM 256-bit key, no additional data, 64-bit tag",0,null,null],["AES-GCM 256-bit key, 96-bit tag",0,null,null],["AES-GCM 256-bit key, no additional data, 96-bit tag",0,null,null],["AES-GCM 256-bit key, 104-bit tag",0,null,null],["AES-GCM 256-bit key, no additional data, 104-bit tag",0,null,null],["AES-GCM 256-bit key, 112-bit tag",0,null,null],["AES-GCM 256-bit key, no additional data, 112-bit tag",0,null,null],["AES-GCM 256-bit key, 120-bit tag",0,null,null],["AES-GCM 256-bit key, no additional data, 120-bit tag",0,null,null],["AES-GCM 256-bit key, 128-bit tag",0,null,null],["AES-GCM 256-bit key, no additional data, 128-bit tag",0,null,null],["AES-GCM 128-bit key, 32-bit tag with altered plaintext",0,null,null],["AES-GCM 128-bit key, no additional data, 32-bit tag with altered plaintext",0,null,null],["AES-GCM 128-bit key, 64-bit tag with altered plaintext",0,null,null],["AES-GCM 128-bit key, no additional data, 64-bit tag with altered plaintext",0,null,null],["AES-GCM 128-bit key, 96-bit tag with altered plaintext",0,null,null],["AES-GCM 128-bit key, no additional data, 96-bit tag with altered plaintext",0,null,null],["AES-GCM 128-bit key, 104-bit tag with altered plaintext",0,null,null],["AES-GCM 128-bit key, no additional data, 104-bit tag with altered plaintext",0,null,null],["AES-GCM 128-bit key, 112-bit tag with altered plaintext",0,null,null],["AES-GCM 128-bit key, no additional data, 112-bit tag with altered plaintext",0,null,null],["AES-GCM 128-bit key, 120-bit tag with altered plaintext",0,null,null],["AES-GCM 128-bit key, no additional data, 120-bit tag with altered plaintext",0,null,null],["AES-GCM 128-bit key, 128-bit tag with altered plaintext",0,null,null],["AES-GCM 128-bit key, no additional data, 128-bit tag with altered plaintext",0,null,null],["AES-GCM 192-bit key, 32-bit tag with altered plaintext",0,null,null],["AES-GCM 192-bit key, no additional data, 32-bit tag with altered plaintext",0,null,null],["AES-GCM 192-bit key, 64-bit tag with altered plaintext",0,null,null],["AES-GCM 192-bit key, no additional data, 64-bit tag with altered plaintext",0,null,null],["AES-GCM 192-bit key, 96-bit tag with altered plaintext",0,null,null],["AES-GCM 192-bit key, no additional data, 96-bit tag with altered plaintext",0,null,null],["AES-GCM 192-bit key, 104-bit tag with altered plaintext",0,null,null],["AES-GCM 192-bit key, no additional data, 104-bit tag with altered plaintext",0,null,null],["AES-GCM 192-bit key, 112-bit tag with altered plaintext",0,null,null],["AES-GCM 192-bit key, no additional data, 112-bit tag with altered plaintext",0,null,null],["AES-GCM 192-bit key, 120-bit tag with altered plaintext",0,null,null],["AES-GCM 192-bit key, no additional data, 120-bit tag with altered plaintext",0,null,null],["AES-GCM 192-bit key, 128-bit tag with altered plaintext",0,null,null],["AES-GCM 192-bit key, no additional data, 128-bit tag with altered plaintext",0,null,null],["AES-GCM 256-bit key, 32-bit tag with altered plaintext",0,null,null],["AES-GCM 256-bit key, no additional data, 32-bit tag with altered plaintext",0,null,null],["AES-GCM 256-bit key, 64-bit tag with altered plaintext",0,null,null],["AES-GCM 256-bit key, no additional data, 64-bit tag with altered plaintext",0,null,null],["AES-GCM 256-bit key, 96-bit tag with altered plaintext",0,null,null],["AES-GCM 256-bit key, no additional data, 96-bit tag with altered plaintext",0,null,null],["AES-GCM 256-bit key, 104-bit tag with altered plaintext",0,null,null],["AES-GCM 256-bit key, no additional data, 104-bit tag with altered plaintext",0,null,null],["AES-GCM 256-bit key, 112-bit tag with altered plaintext",0,null,null],["AES-GCM 256-bit key, no additional data, 112-bit tag with altered plaintext",0,null,null],["AES-GCM 256-bit key, 120-bit tag with altered plaintext",0,null,null],["AES-GCM 256-bit key, no additional data, 120-bit tag with altered plaintext",0,null,null],["AES-GCM 256-bit key, 128-bit tag with altered plaintext",0,null,null],["AES-GCM 256-bit key, no additional data, 128-bit tag with altered plaintext",0,null,null],["AES-GCM 128-bit key, 32-bit tag decryption",0,null,null],["AES-GCM 128-bit key, no additional data, 32-bit tag decryption",0,null,null],["AES-GCM 128-bit key, 64-bit tag decryption",0,null,null],["AES-GCM 128-bit key, no additional data, 64-bit tag decryption",0,null,null],["AES-GCM 128-bit key, 96-bit tag decryption",0,null,null],["AES-GCM 128-bit key, no additional data, 96-bit tag decryption",0,null,null],["AES-GCM 128-bit key, 104-bit tag decryption",0,null,null],["AES-GCM 128-bit key, no additional data, 104-bit tag decryption",0,null,null],["AES-GCM 128-bit key, 112-bit tag decryption",0,null,null],["AES-GCM 128-bit key, no additional data, 112-bit tag decryption",0,null,null],["AES-GCM 128-bit key, 120-bit tag decryption",0,null,null],["AES-GCM 128-bit key, no additional data, 120-bit tag decryption",0,null,null],["AES-GCM 128-bit key, 128-bit tag decryption",0,null,null],["AES-GCM 128-bit key, no additional data, 128-bit tag decryption",0,null,null],["AES-GCM 192-bit key, 32-bit tag decryption",0,null,null],["AES-GCM 192-bit key, no additional data, 32-bit tag decryption",0,null,null],["AES-GCM 192-bit key, 64-bit tag decryption",0,null,null],["AES-GCM 192-bit key, no additional data, 64-bit tag decryption",0,null,null],["AES-GCM 192-bit key, 96-bit tag decryption",0,null,null],["AES-GCM 192-bit key, no additional data, 96-bit tag decryption",0,null,null],["AES-GCM 192-bit key, 104-bit tag decryption",0,null,null],["AES-GCM 192-bit key, no additional data, 104-bit tag decryption",0,null,null],["AES-GCM 192-bit key, 112-bit tag decryption",0,null,null],["AES-GCM 192-bit key, no additional data, 112-bit tag decryption",0,null,null],["AES-GCM 192-bit key, 120-bit tag decryption",0,null,null],["AES-GCM 192-bit key, no additional data, 120-bit tag decryption",0,null,null],["AES-GCM 192-bit key, 128-bit tag decryption",0,null,null],["AES-GCM 192-bit key, no additional data, 128-bit tag decryption",0,null,null],["AES-GCM 256-bit key, 32-bit tag decryption",0,null,null],["AES-GCM 256-bit key, no additional data, 32-bit tag decryption",0,null,null],["AES-GCM 256-bit key, 64-bit tag decryption",0,null,null],["AES-GCM 256-bit key, no additional data, 64-bit tag decryption",0,null,null],["AES-GCM 256-bit key, 96-bit tag decryption",0,null,null],["AES-GCM 256-bit key, no additional data, 96-bit tag decryption",0,null,null],["AES-GCM 256-bit key, 104-bit tag decryption",0,null,null],["AES-GCM 256-bit key, no additional data, 104-bit tag decryption",0,null,null],["AES-GCM 256-bit key, 112-bit tag decryption",0,null,null],["AES-GCM 256-bit key, no additional data, 112-bit tag decryption",0,null,null],["AES-GCM 256-bit key, 120-bit tag decryption",0,null,null],["AES-GCM 256-bit key, no additional data, 120-bit tag decryption",0,null,null],["AES-GCM 256-bit key, 128-bit tag decryption",0,null,null],["AES-GCM 256-bit key, no additional data, 128-bit tag decryption",0,null,null],["AES-GCM 128-bit key, 32-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 128-bit key, no additional data, 32-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 128-bit key, 64-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 128-bit key, no additional data, 64-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 128-bit key, 96-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 128-bit key, no additional data, 96-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 128-bit key, 104-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 128-bit key, no additional data, 104-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 128-bit key, 112-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 128-bit key, no additional data, 112-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 128-bit key, 120-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 128-bit key, no additional data, 120-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 128-bit key, 128-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 128-bit key, no additional data, 128-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 192-bit key, 32-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 192-bit key, no additional data, 32-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 192-bit key, 64-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 192-bit key, no additional data, 64-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 192-bit key, 96-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 192-bit key, no additional data, 96-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 192-bit key, 104-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 192-bit key, no additional data, 104-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 192-bit key, 112-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 192-bit key, no additional data, 112-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 192-bit key, 120-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 192-bit key, no additional data, 120-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 192-bit key, 128-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 192-bit key, no additional data, 128-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 256-bit key, 32-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 256-bit key, no additional data, 32-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 256-bit key, 64-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 256-bit key, no additional data, 64-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 256-bit key, 96-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 256-bit key, no additional data, 96-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 256-bit key, 104-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 256-bit key, no additional data, 104-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 256-bit key, 112-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 256-bit key, no additional data, 112-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 256-bit key, 120-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 256-bit key, no additional data, 120-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 256-bit key, 128-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 256-bit key, no additional data, 128-bit tag decryption with altered ciphertext",0,null,null],["AES-GCM 128-bit key, 32-bit tag without encrypt usage",0,null,null],["AES-GCM 128-bit key, no additional data, 32-bit tag without encrypt usage",0,null,null],["AES-GCM 128-bit key, 64-bit tag without encrypt usage",0,null,null],["AES-GCM 128-bit key, no additional data, 64-bit tag without encrypt usage",0,null,null],["AES-GCM 128-bit key, 96-bit tag without encrypt usage",0,null,null],["AES-GCM 128-bit key, no additional data, 96-bit tag without encrypt usage",0,null,null],["AES-GCM 128-bit key, 104-bit tag without encrypt usage",0,null,null],["AES-GCM 128-bit key, no additional data, 104-bit tag without encrypt usage",0,null,null],["AES-GCM 128-bit key, 112-bit tag without encrypt usage",0,null,null],["AES-GCM 128-bit key, no additional data, 112-bit tag without encrypt usage",0,null,null],["AES-GCM 128-bit key, 120-bit tag without encrypt usage",0,null,null],["AES-GCM 128-bit key, no additional data, 120-bit tag without encrypt usage",0,null,null],["AES-GCM 128-bit key, 128-bit tag without encrypt usage",0,null,null],["AES-GCM 128-bit key, no additional data, 128-bit tag without encrypt usage",0,null,null],["AES-GCM 192-bit key, 32-bit tag without encrypt usage",0,null,null],["AES-GCM 192-bit key, no additional data, 32-bit tag without encrypt usage",0,null,null],["AES-GCM 192-bit key, 64-bit tag without encrypt usage",0,null,null],["AES-GCM 192-bit key, no additional data, 64-bit tag without encrypt usage",0,null,null],["AES-GCM 192-bit key, 96-bit tag without encrypt usage",0,null,null],["AES-GCM 192-bit key, no additional data, 96-bit tag without encrypt usage",0,null,null],["AES-GCM 192-bit key, 104-bit tag without encrypt usage",0,null,null],["AES-GCM 192-bit key, no additional data, 104-bit tag without encrypt usage",0,null,null],["AES-GCM 192-bit key, 112-bit tag without encrypt usage",0,null,null],["AES-GCM 192-bit key, no additional data, 112-bit tag without encrypt usage",0,null,null],["AES-GCM 192-bit key, 120-bit tag without encrypt usage",0,null,null],["AES-GCM 192-bit key, no additional data, 120-bit tag without encrypt usage",0,null,null],["AES-GCM 192-bit key, 128-bit tag without encrypt usage",0,null,null],["AES-GCM 192-bit key, no additional data, 128-bit tag without encrypt usage",0,null,null],["AES-GCM 256-bit key, 32-bit tag without encrypt usage",0,null,null],["AES-GCM 256-bit key, no additional data, 32-bit tag without encrypt usage",0,null,null],["AES-GCM 256-bit key, 64-bit tag without encrypt usage",0,null,null],["AES-GCM 256-bit key, no additional data, 64-bit tag without encrypt usage",0,null,null],["AES-GCM 256-bit key, 96-bit tag without encrypt usage",0,null,null],["AES-GCM 256-bit key, no additional data, 96-bit tag without encrypt usage",0,null,null],["AES-GCM 256-bit key, 104-bit tag without encrypt usage",0,null,null],["AES-GCM 256-bit key, no additional data, 104-bit tag without encrypt usage",0,null,null],["AES-GCM 256-bit key, 112-bit tag without encrypt usage",0,null,null],["AES-GCM 256-bit key, no additional data, 112-bit tag without encrypt usage",0,null,null],["AES-GCM 256-bit key, 120-bit tag without encrypt usage",0,null,null],["AES-GCM 256-bit key, no additional data, 120-bit tag without encrypt usage",0,null,null],["AES-GCM 256-bit key, 128-bit tag without encrypt usage",0,null,null],["AES-GCM 256-bit key, no additional data, 128-bit tag without encrypt usage",0,null,null],["AES-GCM 128-bit key, 32-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 128-bit key, no additional data, 32-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 128-bit key, 64-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 128-bit key, no additional data, 64-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 128-bit key, 96-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 128-bit key, no additional data, 96-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 128-bit key, 104-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 128-bit key, no additional data, 104-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 128-bit key, 112-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 128-bit key, no additional data, 112-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 128-bit key, 120-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 128-bit key, no additional data, 120-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 128-bit key, 128-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 128-bit key, no additional data, 128-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 192-bit key, 32-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 192-bit key, no additional data, 32-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 192-bit key, 64-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 192-bit key, no additional data, 64-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 192-bit key, 96-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 192-bit key, no additional data, 96-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 192-bit key, 104-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 192-bit key, no additional data, 104-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 192-bit key, 112-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 192-bit key, no additional data, 112-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 192-bit key, 120-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 192-bit key, no additional data, 120-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 192-bit key, 128-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 192-bit key, no additional data, 128-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 256-bit key, 32-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 256-bit key, no additional data, 32-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 256-bit key, 64-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 256-bit key, no additional data, 64-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 256-bit key, 96-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 256-bit key, no additional data, 96-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 256-bit key, 104-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 256-bit key, no additional data, 104-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 256-bit key, 112-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 256-bit key, no additional data, 112-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 256-bit key, 120-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 256-bit key, no additional data, 120-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 256-bit key, 128-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 256-bit key, no additional data, 128-bit tag with mismatched key and algorithm",0,null,null],["AES-GCM 128-bit key, 32-bit tag without decrypt usage",0,null,null],["AES-GCM 128-bit key, no additional data, 32-bit tag without decrypt usage",0,null,null],["AES-GCM 128-bit key, 64-bit tag without decrypt usage",0,null,null],["AES-GCM 128-bit key, no additional data, 64-bit tag without decrypt usage",0,null,null],["AES-GCM 128-bit key, 96-bit tag without decrypt usage",0,null,null],["AES-GCM 128-bit key, no additional data, 96-bit tag without decrypt usage",0,null,null],["AES-GCM 128-bit key, 104-bit tag without decrypt usage",0,null,null],["AES-GCM 128-bit key, no additional data, 104-bit tag without decrypt usage",0,null,null],["AES-GCM 128-bit key, 112-bit tag without decrypt usage",0,null,null],["AES-GCM 128-bit key, no additional data, 112-bit tag without decrypt usage",0,null,null],["AES-GCM 128-bit key, 120-bit tag without decrypt usage",0,null,null],["AES-GCM 128-bit key, no additional data, 120-bit tag without decrypt usage",0,null,null],["AES-GCM 128-bit key, 128-bit tag without decrypt usage",0,null,null],["AES-GCM 128-bit key, no additional data, 128-bit tag without decrypt usage",0,null,null],["AES-GCM 192-bit key, 32-bit tag without decrypt usage",0,null,null],["AES-GCM 192-bit key, no additional data, 32-bit tag without decrypt usage",0,null,null],["AES-GCM 192-bit key, 64-bit tag without decrypt usage",0,null,null],["AES-GCM 192-bit key, no additional data, 64-bit tag without decrypt usage",0,null,null],["AES-GCM 192-bit key, 96-bit tag without decrypt usage",0,null,null],["AES-GCM 192-bit key, no additional data, 96-bit tag without decrypt usage",0,null,null],["AES-GCM 192-bit key, 104-bit tag without decrypt usage",0,null,null],["AES-GCM 192-bit key, no additional data, 104-bit tag without decrypt usage",0,null,null],["AES-GCM 192-bit key, 112-bit tag without decrypt usage",0,null,null],["AES-GCM 192-bit key, no additional data, 112-bit tag without decrypt usage",0,null,null],["AES-GCM 192-bit key, 120-bit tag without decrypt usage",0,null,null],["AES-GCM 192-bit key, no additional data, 120-bit tag without decrypt usage",0,null,null],["AES-GCM 192-bit key, 128-bit tag without decrypt usage",0,null,null],["AES-GCM 192-bit key, no additional data, 128-bit tag without decrypt usage",0,null,null],["AES-GCM 256-bit key, 32-bit tag without decrypt usage",0,null,null],["AES-GCM 256-bit key, no additional data, 32-bit tag without decrypt usage",0,null,null],["AES-GCM 256-bit key, 64-bit tag without decrypt usage",0,null,null],["AES-GCM 256-bit key, no additional data, 64-bit tag without decrypt usage",0,null,null],["AES-GCM 256-bit key, 96-bit tag without decrypt usage",0,null,null],["AES-GCM 256-bit key, no additional data, 96-bit tag without decrypt usage",0,null,null],["AES-GCM 256-bit key, 104-bit tag without decrypt usage",0,null,null],["AES-GCM 256-bit key, no additional data, 104-bit tag without decrypt usage",0,null,null],["AES-GCM 256-bit key, 112-bit tag without decrypt usage",0,null,null],["AES-GCM 256-bit key, no additional data, 112-bit tag without decrypt usage",0,null,null],["AES-GCM 256-bit key, 120-bit tag without decrypt usage",0,null,null],["AES-GCM 256-bit key, no additional data, 120-bit tag without decrypt usage",0,null,null],["AES-GCM 256-bit key, 128-bit tag without decrypt usage",0,null,null],["AES-GCM 256-bit key, no additional data, 128-bit tag without decrypt usage",0,null,null],["AES-GCM 128-bit key, illegal tag length 24-bits",1,"assert_equals: Should throw an OperationError instead of An invalid or illegal string was specified expected \"OperationError\" but got \"SyntaxError\"","run_test/ [0,41,"getWindowHandle",null] 03:10:58 INFO - PROCESS | 3752 | 1483614658308 Marionette TRACE conn4 <- [1,41,null,{"value":"12"}] 03:10:58 INFO - TEST-START | /WebCryptoAPI/encrypt_decrypt/test_rsa_oaep.html 03:10:58 INFO - PROCESS | 3752 | 1483614658312 Marionette TRACE conn4 -> [0,42,"timeouts",{"script":185000}] 03:10:58 INFO - PROCESS | 3752 | 1483614658314 Marionette TRACE conn4 <- [1,42,null,{}] 03:10:58 INFO - PROCESS | 3752 | 1483614658318 Marionette TRACE conn4 -> [0,43,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:10:58 INFO - PROCESS | 3752 | 1483614658424 Marionette TRACE conn4 <- [1,43,null,{"value":null}] 03:10:59 INFO - PROCESS | 3752 | 1483614659082 Marionette TRACE conn4 -> [0,44,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/encrypt_decrypt/test_rsa_oaep.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/encrypt_decrypt/test_rsa_oaep.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:10:59 INFO - PROCESS | 3752 | ++DOCSHELL 0EB90000 == 17 [pid = 3752] [id = 19] 03:10:59 INFO - PROCESS | 3752 | ++DOMWINDOW == 54 (0EB94000) [pid = 3752] [serial = 54] [outer = 00000000] 03:10:59 INFO - PROCESS | 3752 | ++DOMWINDOW == 55 (0F355C00) [pid = 3752] [serial = 55] [outer = 0EB94000] 03:10:59 INFO - PROCESS | 3752 | 1483614659144 Marionette DEBUG loaded listener.js 03:10:59 INFO - PROCESS | 3752 | ++DOMWINDOW == 56 (0F359C00) [pid = 3752] [serial = 56] [outer = 0EB94000] 03:11:00 INFO - PROCESS | 3752 | --DOMWINDOW == 55 (1288E000) [pid = 3752] [serial = 8] [outer = 00000000] [url = chrome://gfxsanity/content/sanitytest.html] 03:11:00 INFO - PROCESS | 3752 | --DOMWINDOW == 54 (0FEDA000) [pid = 3752] [serial = 1] [outer = 00000000] [url = chrome://gfxsanity/content/sanityparent.html] 03:11:00 INFO - PROCESS | 3752 | --DOMWINDOW == 53 (0F9C7800) [pid = 3752] [serial = 36] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/encrypt_decrypt/aes_ctr.worker] 03:11:00 INFO - PROCESS | 3752 | --DOMWINDOW == 52 (13D7C000) [pid = 3752] [serial = 45] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/encrypt_decrypt/test_aes_cbc.html] 03:11:00 INFO - PROCESS | 3752 | --DOMWINDOW == 51 (1288FC00) [pid = 3752] [serial = 48] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/encrypt_decrypt/test_aes_ctr.html] 03:11:00 INFO - PROCESS | 3752 | --DOMWINDOW == 50 (0FB05000) [pid = 3752] [serial = 39] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/encrypt_decrypt/aes_gcm.worker] 03:11:00 INFO - PROCESS | 3752 | --DOMWINDOW == 49 (1A696400) [pid = 3752] [serial = 27] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/encrypt_decrypt/aes_cbc.worker] 03:11:00 INFO - PROCESS | 3752 | --DOMWINDOW == 48 (189E0800) [pid = 3752] [serial = 24] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/digest/test_digest.html] 03:11:00 INFO - PROCESS | 3752 | --DOMWINDOW == 47 (1843A400) [pid = 3752] [serial = 18] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/digest/digest.worker] 03:11:00 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:11:00 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:11:00 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:11:00 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:11:00 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:11:00 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:11:00 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:11:00 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:11:00 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:11:00 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:11:00 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:11:00 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, NS_ERROR_DOM_OPERATION_ERR) failed with result 0x805A1FFC: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/crypto/WebCryptoTask.cpp, line 1006 03:11:00 INFO - PROCESS | 3752 | 1483614660895 Marionette TRACE conn4 <- [1,44,null,{"value":["/WebCryptoAPI/encrypt_decrypt/test_rsa_oaep.html",0,null,null,[["RSA-OAEP with SHA-1 and no label decryption",0,null,null],["RSA-OAEP with SHA-256 and no label decryption",0,null,null],["RSA-OAEP with SHA-384 and no label decryption",0,null,null],["RSA-OAEP with SHA-512 and no label decryption",0,null,null],["RSA-OAEP with SHA-1 and empty label decryption",0,null,null],["RSA-OAEP with SHA-256 and empty label decryption",0,null,null],["RSA-OAEP with SHA-384 and empty label decryption",0,null,null],["RSA-OAEP with SHA-512 and empty label decryption",0,null,null],["RSA-OAEP with SHA-1 and a label decryption",0,null,null],["RSA-OAEP with SHA-256 and a label decryption",0,null,null],["RSA-OAEP with SHA-384 and a label decryption",0,null,null],["RSA-OAEP with SHA-512 and a label decryption",0,null,null],["RSA-OAEP with SHA-1 and no label decryption with altered ciphertext",0,null,null],["RSA-OAEP with SHA-256 and no label decryption with altered ciphertext",0,null,null],["RSA-OAEP with SHA-384 and no label decryption with altered ciphertext",0,null,null],["RSA-OAEP with SHA-512 and no label decryption with altered ciphertext",0,null,null],["RSA-OAEP with SHA-1 and empty label decryption with altered ciphertext",0,null,null],["RSA-OAEP with SHA-256 and empty label decryption with altered ciphertext",0,null,null],["RSA-OAEP with SHA-384 and empty label decryption with altered ciphertext",0,null,null],["RSA-OAEP with SHA-512 and empty label decryption with altered ciphertext",0,null,null],["RSA-OAEP with SHA-1 and a label decryption with altered ciphertext",0,null,null],["RSA-OAEP with SHA-256 and a label decryption with altered ciphertext",0,null,null],["RSA-OAEP with SHA-384 and a label decryption with altered ciphertext",0,null,null],["RSA-OAEP with SHA-512 and a label decryption with altered ciphertext",0,null,null],["RSA-OAEP with SHA-1 and no label using publicKey to decrypt",0,null,null],["RSA-OAEP with SHA-256 and no label using publicKey to decrypt",0,null,null],["RSA-OAEP with SHA-384 and no label using publicKey to decrypt",0,null,null],["RSA-OAEP with SHA-512 and no label using publicKey to decrypt",0,null,null],["RSA-OAEP with SHA-1 and empty label using publicKey to decrypt",0,null,null],["RSA-OAEP with SHA-256 and empty label using publicKey to decrypt",0,null,null],["RSA-OAEP with SHA-384 and empty label using publicKey to decrypt",0,null,null],["RSA-OAEP with SHA-512 and empty label using publicKey to decrypt",0,null,null],["RSA-OAEP with SHA-1 and a label using publicKey to decrypt",0,null,null],["RSA-OAEP with SHA-256 and a label using publicKey to decrypt",0,null,null],["RSA-OAEP with SHA-384 and a label using publicKey to decrypt",0,null,null],["RSA-OAEP with SHA-512 and a label using publicKey to decrypt",0,null,null],["RSA-OAEP with SHA-1 and no label no decrypt usage",0,null,null],["RSA-OAEP with SHA-256 and no label no decrypt usage",0,null,null],["RSA-OAEP with SHA-384 and no label no decrypt usage",0,null,null],["RSA-OAEP with SHA-512 and no label no decrypt usage",0,null,null],["RSA-OAEP with SHA-1 and empty label no decrypt usage",0,null,null],["RSA-OAEP with SHA-256 and empty label no decrypt usage",0,null,null],["RSA-OAEP with SHA-384 and empty label no decrypt usage",0,null,null],["RSA-OAEP with SHA-512 and empty label no decrypt usage",0,null,null],["RSA-OAEP with SHA-1 and a label no decrypt usage",0,null,null],["RSA-OAEP with SHA-256 and a label no decrypt usage",0,null,null],["RSA-OAEP with SHA-384 and a label no decrypt usage",0,null,null],["RSA-OAEP with SHA-512 and a label no decrypt usage",0,null,null],["RSA-OAEP with SHA-1 and no label with altered plaintext",0,null,null],["RSA-OAEP with SHA-256 and no label with altered plaintext",0,null,null],["RSA-OAEP with SHA-384 and no label with altered plaintext",0,null,null],["RSA-OAEP with SHA-512 and no label with altered plaintext",0,null,null],["RSA-OAEP with SHA-1 and empty label with altered plaintext",0,null,null],["RSA-OAEP with SHA-256 and empty label with altered plaintext",0,null,null],["RSA-OAEP with SHA-384 and empty label with altered plaintext",0,null,null],["RSA-OAEP with SHA-512 and empty label with altered plaintext",0,null,null],["RSA-OAEP with SHA-1 and a label with altered plaintext",0,null,null],["RSA-OAEP with SHA-256 and a label with altered plaintext",0,null,null],["RSA-OAEP with SHA-384 and a label with altered plaintext",0,null,null],["RSA-OAEP with SHA-512 and a label with altered plaintext",0,null,null],["RSA-OAEP with SHA-1 and no label",0,null,null],["RSA-OAEP with SHA-256 and no label",0,null,null],["RSA-OAEP with SHA-384 and no label",0,null,null],["RSA-OAEP with SHA-512 and no label",0,null,null],["RSA-OAEP with SHA-1 and empty label",0,null,null],["RSA-OAEP with SHA-256 and empty label",0,null,null],["RSA-OAEP with SHA-384 and empty label",0,null,null],["RSA-OAEP with SHA-512 and empty label",0,null,null],["RSA-OAEP with SHA-1 and a label",0,null,null],["RSA-OAEP with SHA-256 and a label",0,null,null],["RSA-OAEP with SHA-384 and a label",0,null,null],["RSA-OAEP with SHA-512 and a label",0,null,null],["RSA-OAEP with SHA-1 and no label too long plaintext",0,null,null],["RSA-OAEP with SHA-256 and no label too long plaintext",0,null,null],["RSA-OAEP with SHA-384 and no label too long plaintext",0,null,null],["RSA-OAEP with SHA-512 and no label too long plaintext",0,null,null],["RSA-OAEP with SHA-1 and empty label too long plaintext",0,null,null],["RSA-OAEP with SHA-256 and empty label too long plaintext",0,null,null],["RSA-OAEP with SHA-384 and empty label too long plaintext",0,null,null],["RSA-OAEP with SHA-512 and empty label too long plaintext",0,null,null],["RSA-OAEP with SHA-1 and a label too long plaintext",0,null,null],["RSA-OAEP with SHA-256 and a label too long plaintext",0,null,null],["RSA-OAEP with SHA-384 and a label too long plaintext",0,null,null],["RSA-OAEP with SHA-512 and a label too long plaintext",0,null,null],["RSA-OAEP with SHA-1 and no label using privateKey to encrypt",0,null,null],["RSA-OAEP with SHA-256 and no label using privateKey to encrypt",0,null,null],["RSA-OAEP with SHA-384 and no label using privateKey to encrypt",0,null,null],["RSA-OAEP with SHA-512 and no label using privateKey to encrypt",0,null,null],["RSA-OAEP with SHA-1 and empty label using privateKey to encrypt",0,null,null],["RSA-OAEP with SHA-256 and empty label using privateKey to encrypt",0,null,null],["RSA-OAEP with SHA-384 and empty label using privateKey to encrypt",0,null,null],["RSA-OAEP with SHA-512 and empty label using privateKey to encrypt",0,null,null],["RSA-OAEP with SHA-1 and a label using privateKey to encrypt",0,null,null],["RSA-OAEP with SHA-256 and a label using privateKey to encrypt",0,null,null],["RSA-OAEP with SHA-384 and a label using privateKey to encrypt",0,null,null],["RSA-OAEP with SHA-512 and a label using privateKey to encrypt",0,null,null],["RSA-OAEP with SHA-1 and no label no encrypt usage",0,null,null],["RSA-OAEP with SHA-256 and no label no encrypt usage",0,null,null],["RSA-OAEP with SHA-384 and no label no encrypt usage",0,null,null],["RSA-OAEP with SHA-512 and no label no encrypt usage",0,null,null],["RSA-OAEP with SHA-1 and empty label no encrypt usage",0,null,null],["RSA-OAEP with SHA-256 and empty label no encrypt usage",0,null,null],["RSA-OAEP with SHA-384 and empty label no encrypt usage",0,null,null],["RSA-OAEP with SHA-512 and empty label no encrypt usage",0,null,null],["RSA-OAEP with SHA-1 and a label no encrypt usage",0,null,null],["RSA-OAEP with SHA-256 and a label no encrypt usage",0,null,null],["RSA-OAEP with SHA-384 and a label no encrypt usage",0,null,null],["RSA-OAEP with SHA-512 and a label no encrypt usage",0,null,null]]]}] 03:11:00 INFO - ............................................................................................................ 03:11:00 INFO - TEST-OK | /WebCryptoAPI/encrypt_decrypt/test_rsa_oaep.html | took 2639ms 03:11:00 INFO - PROCESS | 3752 | 1483614660945 Marionette TRACE conn4 -> [0,45,"getWindowHandle",null] 03:11:00 INFO - PROCESS | 3752 | 1483614660948 Marionette TRACE conn4 <- [1,45,null,{"value":"12"}] 03:11:00 INFO - TEST-START | /WebCryptoAPI/generateKey/failures.worker 03:11:00 INFO - PROCESS | 3752 | 1483614660953 Marionette TRACE conn4 -> [0,46,"timeouts",{"script":35000}] 03:11:00 INFO - PROCESS | 3752 | 1483614660958 Marionette TRACE conn4 <- [1,46,null,{}] 03:11:00 INFO - PROCESS | 3752 | 1483614660963 Marionette TRACE conn4 -> [0,47,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:11:01 INFO - PROCESS | 3752 | 1483614661073 Marionette TRACE conn4 <- [1,47,null,{"value":null}] 03:11:01 INFO - PROCESS | 3752 | 1483614661079 Marionette TRACE conn4 -> [0,48,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/failures.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/failures.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:11:01 INFO - PROCESS | 3752 | ++DOCSHELL 0F68FC00 == 18 [pid = 3752] [id = 20] 03:11:01 INFO - PROCESS | 3752 | ++DOMWINDOW == 48 (0F690400) [pid = 3752] [serial = 57] [outer = 00000000] 03:11:01 INFO - PROCESS | 3752 | ++DOMWINDOW == 49 (0FB07C00) [pid = 3752] [serial = 58] [outer = 0F690400] 03:11:01 INFO - PROCESS | 3752 | 1483614661164 Marionette DEBUG loaded listener.js 03:11:01 INFO - PROCESS | 3752 | ++DOMWINDOW == 50 (0F9C9800) [pid = 3752] [serial = 59] [outer = 0F690400] 03:11:01 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:11:04 INFO - PROCESS | 3752 | --DOCSHELL 11107800 == 17 [pid = 3752] [id = 15] 03:11:04 INFO - PROCESS | 3752 | --DOCSHELL 0FB04C00 == 16 [pid = 3752] [id = 14] 03:11:04 INFO - PROCESS | 3752 | --DOCSHELL 16987800 == 15 [pid = 3752] [id = 18] 03:11:04 INFO - PROCESS | 3752 | --DOCSHELL 1288E800 == 14 [pid = 3752] [id = 17] 03:11:04 INFO - PROCESS | 3752 | --DOCSHELL 0EB90000 == 13 [pid = 3752] [id = 19] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 49 (15DDE800) [pid = 3752] [serial = 15] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 48 (0FBB6400) [pid = 3752] [serial = 40] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 47 (0FB0C400) [pid = 3752] [serial = 37] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 46 (12BEE800) [pid = 3752] [serial = 9] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 45 (12BF5800) [pid = 3752] [serial = 10] [outer = 00000000] [url = chrome://gfxsanity/content/sanitytest.html] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 44 (0FEDA800) [pid = 3752] [serial = 2] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 43 (1110A400) [pid = 3752] [serial = 4] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 42 (0FB09C00) [pid = 3752] [serial = 38] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 41 (12BF4C00) [pid = 3752] [serial = 43] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 40 (14775800) [pid = 3752] [serial = 46] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 39 (1441DC00) [pid = 3752] [serial = 49] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 38 (0FBB1800) [pid = 3752] [serial = 41] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 37 (16F05C00) [pid = 3752] [serial = 52] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 36 (14499800) [pid = 3752] [serial = 47] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 35 (140C6000) [pid = 3752] [serial = 50] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 34 (19ABE400) [pid = 3752] [serial = 29] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 33 (19AC5C00) [pid = 3752] [serial = 31] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 32 (1AD85000) [pid = 3752] [serial = 34] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 31 (1A6A1C00) [pid = 3752] [serial = 28] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 30 (194C4000) [pid = 3752] [serial = 25] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 29 (194C4C00) [pid = 3752] [serial = 26] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 28 (1843CC00) [pid = 3752] [serial = 20] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 27 (186E9000) [pid = 3752] [serial = 22] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 26 (1843D800) [pid = 3752] [serial = 19] [outer = 00000000] [url = about:blank] 03:11:04 INFO - PROCESS | 3752 | --DOMWINDOW == 25 (16113400) [pid = 3752] [serial = 13] [outer = 00000000] [url = about:blank] 03:11:06 INFO - PROCESS | 3752 | --DOMWINDOW == 24 (1110BC00) [pid = 3752] [serial = 42] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/encrypt_decrypt/rsa.worker] 03:11:06 INFO - PROCESS | 3752 | --DOMWINDOW == 23 (0EB94000) [pid = 3752] [serial = 54] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/encrypt_decrypt/test_rsa_oaep.html] 03:11:06 INFO - PROCESS | 3752 | --DOMWINDOW == 22 (16989C00) [pid = 3752] [serial = 51] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/encrypt_decrypt/test_aes_gcm.html] 03:11:11 INFO - PROCESS | 3752 | --DOCSHELL 0F9C7400 == 12 [pid = 3752] [id = 13] 03:11:11 INFO - PROCESS | 3752 | --DOCSHELL 18691800 == 11 [pid = 3752] [id = 9] 03:11:11 INFO - PROCESS | 3752 | --DOCSHELL 15E78400 == 10 [pid = 3752] [id = 7] 03:11:11 INFO - PROCESS | 3752 | --DOCSHELL 1A2EC000 == 9 [pid = 3752] [id = 10] 03:11:11 INFO - PROCESS | 3752 | --DOCSHELL 13D7BC00 == 8 [pid = 3752] [id = 16] 03:11:11 INFO - PROCESS | 3752 | --DOMWINDOW == 21 (12BFB800) [pid = 3752] [serial = 44] [outer = 00000000] [url = about:blank] 03:11:11 INFO - PROCESS | 3752 | --DOMWINDOW == 20 (0FB07C00) [pid = 3752] [serial = 58] [outer = 00000000] [url = about:blank] 03:11:11 INFO - PROCESS | 3752 | --DOMWINDOW == 19 (0F359C00) [pid = 3752] [serial = 56] [outer = 00000000] [url = about:blank] 03:11:11 INFO - PROCESS | 3752 | --DOMWINDOW == 18 (0F355C00) [pid = 3752] [serial = 55] [outer = 00000000] [url = about:blank] 03:11:11 INFO - PROCESS | 3752 | --DOMWINDOW == 17 (16DDB000) [pid = 3752] [serial = 53] [outer = 00000000] [url = about:blank] 03:11:17 INFO - PROCESS | 3752 | ++DOMWINDOW == 18 (0EC39400) [pid = 3752] [serial = 60] [outer = 1AD80400] 03:11:30 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:11:30 INFO - PROCESS | 3752 | 1483614690291 Marionette TRACE conn4 <- [1,48,null,{"value":["/WebCryptoAPI/generateKey/failures.worker",1,"Error in worker http://web-platform.test:8000/WebCryptoAPI/generateKey/failures.js: ReferenceError: CryptoKey is not defined",null,[]]}] 03:11:30 INFO - TEST-ERROR | /WebCryptoAPI/generateKey/failures.worker | took 29388ms 03:11:30 INFO - PROCESS | 3752 | 1483614690350 Marionette TRACE conn4 -> [0,49,"getWindowHandle",null] 03:11:30 INFO - PROCESS | 3752 | 1483614690340 Marionette TRACE conn4 <- [1,49,null,{"value":"12"}] 03:11:30 INFO - TEST-START | /WebCryptoAPI/generateKey/failures_AES-CBC.worker 03:11:30 INFO - PROCESS | 3752 | 1483614690347 Marionette TRACE conn4 -> [0,50,"timeouts",{"script":35000}] 03:11:30 INFO - PROCESS | 3752 | 1483614690351 Marionette TRACE conn4 <- [1,50,null,{}] 03:11:30 INFO - PROCESS | 3752 | 1483614690359 Marionette TRACE conn4 -> [0,51,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:11:30 INFO - PROCESS | 3752 | 1483614690473 Marionette TRACE conn4 <- [1,51,null,{"value":null}] 03:11:30 INFO - PROCESS | 3752 | 1483614690481 Marionette TRACE conn4 -> [0,52,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/failures_AES-CBC.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/failures_AES-CBC.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:11:30 INFO - PROCESS | 3752 | ++DOCSHELL 0F68BC00 == 9 [pid = 3752] [id = 21] 03:11:30 INFO - PROCESS | 3752 | ++DOMWINDOW == 19 (0F68C000) [pid = 3752] [serial = 61] [outer = 00000000] 03:11:30 INFO - PROCESS | 3752 | ++DOMWINDOW == 20 (0F691800) [pid = 3752] [serial = 62] [outer = 0F68C000] 03:11:30 INFO - PROCESS | 3752 | 1483614690544 Marionette DEBUG loaded listener.js 03:11:30 INFO - PROCESS | 3752 | ++DOMWINDOW == 21 (0F693400) [pid = 3752] [serial = 63] [outer = 0F68C000] 03:11:30 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:11:38 INFO - PROCESS | 3752 | --DOCSHELL 0F68FC00 == 8 [pid = 3752] [id = 20] 03:11:38 INFO - PROCESS | 3752 | --DOMWINDOW == 20 (1BD29000) [pid = 3752] [serial = 35] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.] 03:11:40 INFO - PROCESS | 3752 | --DOMWINDOW == 19 (0F690400) [pid = 3752] [serial = 57] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/failures.worker] 03:11:41 INFO - PROCESS | 3752 | 1483614701377 addons.productaddons WARN Failed downloading XML, status: 0, reason: error 03:11:45 INFO - PROCESS | 3752 | --DOMWINDOW == 18 (0F9C9800) [pid = 3752] [serial = 59] [outer = 00000000] [url = about:blank] 03:11:45 INFO - PROCESS | 3752 | --DOMWINDOW == 17 (0F691800) [pid = 3752] [serial = 62] [outer = 00000000] [url = about:blank] 03:11:59 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:11:59 INFO - PROCESS | 3752 | 1483614719643 Marionette TRACE conn4 <- [1,52,null,{"value":["/WebCryptoAPI/generateKey/failures_AES-CBC.worker",1,"Error in worker http://web-platform.test:8000/WebCryptoAPI/generateKey/failures.js: ReferenceError: CryptoKey is not defined",null,[]]}] 03:11:59 INFO - TEST-ERROR | /WebCryptoAPI/generateKey/failures_AES-CBC.worker | took 29342ms 03:11:59 INFO - PROCESS | 3752 | 1483614719698 Marionette TRACE conn4 -> [0,53,"getWindowHandle",null] 03:11:59 INFO - PROCESS | 3752 | 1483614719703 Marionette TRACE conn4 <- [1,53,null,{"value":"12"}] 03:11:59 INFO - TEST-START | /WebCryptoAPI/generateKey/failures_AES-CTR.worker 03:11:59 INFO - PROCESS | 3752 | 1483614719710 Marionette TRACE conn4 -> [0,54,"timeouts",{"script":35000}] 03:11:59 INFO - PROCESS | 3752 | 1483614719714 Marionette TRACE conn4 <- [1,54,null,{}] 03:11:59 INFO - PROCESS | 3752 | 1483614719721 Marionette TRACE conn4 -> [0,55,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:11:59 INFO - PROCESS | 3752 | 1483614719862 Marionette TRACE conn4 <- [1,55,null,{"value":null}] 03:11:59 INFO - PROCESS | 3752 | 1483614719896 Marionette TRACE conn4 -> [0,56,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/failures_AES-CTR.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/failures_AES-CTR.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:11:59 INFO - PROCESS | 3752 | ++DOCSHELL 0F9C5000 == 9 [pid = 3752] [id = 22] 03:11:59 INFO - PROCESS | 3752 | ++DOMWINDOW == 18 (0F9C5400) [pid = 3752] [serial = 64] [outer = 00000000] 03:11:59 INFO - PROCESS | 3752 | ++DOMWINDOW == 19 (0F9CA400) [pid = 3752] [serial = 65] [outer = 0F9C5400] 03:11:59 INFO - PROCESS | 3752 | 1483614719960 Marionette DEBUG loaded listener.js 03:12:00 INFO - PROCESS | 3752 | ++DOMWINDOW == 20 (0F9CC000) [pid = 3752] [serial = 66] [outer = 0F9C5400] 03:12:00 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:12:08 INFO - PROCESS | 3752 | --DOCSHELL 0F68BC00 == 8 [pid = 3752] [id = 21] 03:12:11 INFO - PROCESS | 3752 | --DOMWINDOW == 19 (0F68C000) [pid = 3752] [serial = 61] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/failures_AES-CBC.worker] 03:12:15 INFO - PROCESS | 3752 | ++DOMWINDOW == 20 (0EB49000) [pid = 3752] [serial = 67] [outer = 1AD80400] 03:12:16 INFO - PROCESS | 3752 | --DOMWINDOW == 19 (0F693400) [pid = 3752] [serial = 63] [outer = 00000000] [url = about:blank] 03:12:16 INFO - PROCESS | 3752 | --DOMWINDOW == 18 (0F9CA400) [pid = 3752] [serial = 65] [outer = 00000000] [url = about:blank] 03:12:29 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:12:29 INFO - PROCESS | 3752 | 1483614749045 Marionette TRACE conn4 <- [1,56,null,{"value":["/WebCryptoAPI/generateKey/failures_AES-CTR.worker",1,"Error in worker http://web-platform.test:8000/WebCryptoAPI/generateKey/failures.js: ReferenceError: CryptoKey is not defined",null,[]]}] 03:12:29 INFO - TEST-ERROR | /WebCryptoAPI/generateKey/failures_AES-CTR.worker | took 29387ms 03:12:29 INFO - PROCESS | 3752 | 1483614749094 Marionette TRACE conn4 -> [0,57,"getWindowHandle",null] 03:12:29 INFO - PROCESS | 3752 | 1483614749101 Marionette TRACE conn4 <- [1,57,null,{"value":"12"}] 03:12:29 INFO - TEST-START | /WebCryptoAPI/generateKey/failures_AES-GCM.worker 03:12:29 INFO - PROCESS | 3752 | 1483614749107 Marionette TRACE conn4 -> [0,58,"timeouts",{"script":35000}] 03:12:29 INFO - PROCESS | 3752 | 1483614749112 Marionette TRACE conn4 <- [1,58,null,{}] 03:12:29 INFO - PROCESS | 3752 | 1483614749118 Marionette TRACE conn4 -> [0,59,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:12:29 INFO - PROCESS | 3752 | 1483614749250 Marionette TRACE conn4 <- [1,59,null,{"value":null}] 03:12:29 INFO - PROCESS | 3752 | 1483614749284 Marionette TRACE conn4 -> [0,60,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/failures_AES-GCM.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/failures_AES-GCM.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:12:29 INFO - PROCESS | 3752 | ++DOCSHELL 0F9CB400 == 9 [pid = 3752] [id = 23] 03:12:29 INFO - PROCESS | 3752 | ++DOMWINDOW == 19 (0F9CC400) [pid = 3752] [serial = 68] [outer = 00000000] 03:12:29 INFO - PROCESS | 3752 | ++DOMWINDOW == 20 (0FB0D800) [pid = 3752] [serial = 69] [outer = 0F9CC400] 03:12:29 INFO - PROCESS | 3752 | 1483614749347 Marionette DEBUG loaded listener.js 03:12:29 INFO - PROCESS | 3752 | ++DOMWINDOW == 21 (0FBB1400) [pid = 3752] [serial = 70] [outer = 0F9CC400] 03:12:29 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:12:38 INFO - PROCESS | 3752 | --DOCSHELL 0F9C5000 == 8 [pid = 3752] [id = 22] 03:12:40 INFO - PROCESS | 3752 | --DOMWINDOW == 20 (0F9C5400) [pid = 3752] [serial = 64] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/failures_AES-CTR.worker] 03:12:45 INFO - PROCESS | 3752 | --DOMWINDOW == 19 (0F9CC000) [pid = 3752] [serial = 66] [outer = 00000000] [url = about:blank] 03:12:45 INFO - PROCESS | 3752 | --DOMWINDOW == 18 (0FB0D800) [pid = 3752] [serial = 69] [outer = 00000000] [url = about:blank] 03:12:45 INFO - PROCESS | 3752 | --DOMWINDOW == 17 (0EC39400) [pid = 3752] [serial = 60] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.] 03:12:58 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:12:58 INFO - PROCESS | 3752 | 1483614778448 Marionette TRACE conn4 <- [1,60,null,{"value":["/WebCryptoAPI/generateKey/failures_AES-GCM.worker",1,"Error in worker http://web-platform.test:8000/WebCryptoAPI/generateKey/failures.js: ReferenceError: CryptoKey is not defined",null,[]]}] 03:12:58 INFO - TEST-ERROR | /WebCryptoAPI/generateKey/failures_AES-GCM.worker | took 29388ms 03:12:58 INFO - PROCESS | 3752 | 1483614778497 Marionette TRACE conn4 -> [0,61,"getWindowHandle",null] 03:12:58 INFO - TEST-START | /WebCryptoAPI/generateKey/failures_AES-KW.worker 03:12:58 INFO - PROCESS | 3752 | 1483614778503 Marionette TRACE conn4 <- [1,61,null,{"value":"12"}] 03:12:58 INFO - PROCESS | 3752 | 1483614778509 Marionette TRACE conn4 -> [0,62,"timeouts",{"script":35000}] 03:12:58 INFO - PROCESS | 3752 | 1483614778514 Marionette TRACE conn4 <- [1,62,null,{}] 03:12:58 INFO - PROCESS | 3752 | 1483614778521 Marionette TRACE conn4 -> [0,63,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:12:58 INFO - PROCESS | 3752 | 1483614778653 Marionette TRACE conn4 <- [1,63,null,{"value":null}] 03:12:58 INFO - PROCESS | 3752 | 1483614778686 Marionette TRACE conn4 -> [0,64,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/failures_AES-KW.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/failures_AES-KW.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:12:58 INFO - PROCESS | 3752 | ++DOCSHELL 0F695400 == 9 [pid = 3752] [id = 24] 03:12:58 INFO - PROCESS | 3752 | ++DOMWINDOW == 18 (0F695C00) [pid = 3752] [serial = 71] [outer = 00000000] 03:12:58 INFO - PROCESS | 3752 | ++DOMWINDOW == 19 (0F9C7C00) [pid = 3752] [serial = 72] [outer = 0F695C00] 03:12:58 INFO - PROCESS | 3752 | 1483614778750 Marionette DEBUG loaded listener.js 03:12:58 INFO - PROCESS | 3752 | ++DOMWINDOW == 20 (0F9C8C00) [pid = 3752] [serial = 73] [outer = 0F695C00] 03:12:58 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:13:07 INFO - PROCESS | 3752 | --DOCSHELL 0F9CB400 == 8 [pid = 3752] [id = 23] 03:13:09 INFO - PROCESS | 3752 | --DOMWINDOW == 19 (0F9CC400) [pid = 3752] [serial = 68] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/failures_AES-GCM.worker] 03:13:14 INFO - PROCESS | 3752 | --DOMWINDOW == 18 (0FBB1400) [pid = 3752] [serial = 70] [outer = 00000000] [url = about:blank] 03:13:14 INFO - PROCESS | 3752 | --DOMWINDOW == 17 (0F9C7C00) [pid = 3752] [serial = 72] [outer = 00000000] [url = about:blank] 03:13:27 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:13:27 INFO - PROCESS | 3752 | 1483614807851 Marionette TRACE conn4 <- [1,64,null,{"value":["/WebCryptoAPI/generateKey/failures_AES-KW.worker",1,"Error in worker http://web-platform.test:8000/WebCryptoAPI/generateKey/failures.js: ReferenceError: CryptoKey is not defined",null,[]]}] 03:13:27 INFO - TEST-ERROR | /WebCryptoAPI/generateKey/failures_AES-KW.worker | took 29387ms 03:13:27 INFO - PROCESS | 3752 | 1483614807899 Marionette TRACE conn4 -> [0,65,"getWindowHandle",null] 03:13:27 INFO - PROCESS | 3752 | 1483614807905 Marionette TRACE conn4 <- [1,65,null,{"value":"12"}] 03:13:27 INFO - TEST-START | /WebCryptoAPI/generateKey/failures_ECDH.worker 03:13:27 INFO - PROCESS | 3752 | 1483614807912 Marionette TRACE conn4 -> [0,66,"timeouts",{"script":35000}] 03:13:27 INFO - PROCESS | 3752 | 1483614807916 Marionette TRACE conn4 <- [1,66,null,{}] 03:13:27 INFO - PROCESS | 3752 | 1483614807924 Marionette TRACE conn4 -> [0,67,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:13:28 INFO - PROCESS | 3752 | 1483614808067 Marionette TRACE conn4 <- [1,67,null,{"value":null}] 03:13:28 INFO - PROCESS | 3752 | 1483614808101 Marionette TRACE conn4 -> [0,68,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/failures_ECDH.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/failures_ECDH.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:13:28 INFO - PROCESS | 3752 | ++DOCSHELL 0F9C6400 == 9 [pid = 3752] [id = 25] 03:13:28 INFO - PROCESS | 3752 | ++DOMWINDOW == 18 (0F9C7400) [pid = 3752] [serial = 74] [outer = 00000000] 03:13:28 INFO - PROCESS | 3752 | ++DOMWINDOW == 19 (0FB02C00) [pid = 3752] [serial = 75] [outer = 0F9C7400] 03:13:28 INFO - PROCESS | 3752 | 1483614808165 Marionette DEBUG loaded listener.js 03:13:28 INFO - PROCESS | 3752 | ++DOMWINDOW == 20 (0FB0A400) [pid = 3752] [serial = 76] [outer = 0F9C7400] 03:13:28 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:13:37 INFO - PROCESS | 3752 | --DOCSHELL 0F695400 == 8 [pid = 3752] [id = 24] 03:13:39 INFO - PROCESS | 3752 | --DOMWINDOW == 19 (0F695C00) [pid = 3752] [serial = 71] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/failures_AES-KW.worker] 03:13:42 INFO - PROCESS | 3752 | ++DOMWINDOW == 20 (0F68D000) [pid = 3752] [serial = 77] [outer = 1AD80400] 03:13:44 INFO - PROCESS | 3752 | --DOMWINDOW == 19 (0F9C8C00) [pid = 3752] [serial = 73] [outer = 00000000] [url = about:blank] 03:13:44 INFO - PROCESS | 3752 | --DOMWINDOW == 18 (0FB02C00) [pid = 3752] [serial = 75] [outer = 00000000] [url = about:blank] 03:13:51 INFO - PROCESS | 3752 | --DOMWINDOW == 17 (0EB49000) [pid = 3752] [serial = 67] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.] 03:13:57 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:13:57 INFO - PROCESS | 3752 | 1483614837253 Marionette TRACE conn4 <- [1,68,null,{"value":["/WebCryptoAPI/generateKey/failures_ECDH.worker",1,"Error in worker http://web-platform.test:8000/WebCryptoAPI/generateKey/failures.js: ReferenceError: CryptoKey is not defined",null,[]]}] 03:13:57 INFO - TEST-ERROR | /WebCryptoAPI/generateKey/failures_ECDH.worker | took 29388ms 03:13:57 INFO - PROCESS | 3752 | 1483614837302 Marionette TRACE conn4 -> [0,69,"getWindowHandle",null] 03:13:57 INFO - TEST-START | /WebCryptoAPI/generateKey/failures_ECDSA.worker 03:13:57 INFO - PROCESS | 3752 | 1483614837308 Marionette TRACE conn4 <- [1,69,null,{"value":"12"}] 03:13:57 INFO - PROCESS | 3752 | 1483614837314 Marionette TRACE conn4 -> [0,70,"timeouts",{"script":35000}] 03:13:57 INFO - PROCESS | 3752 | 1483614837318 Marionette TRACE conn4 <- [1,70,null,{}] 03:13:57 INFO - PROCESS | 3752 | 1483614837326 Marionette TRACE conn4 -> [0,71,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:13:57 INFO - PROCESS | 3752 | 1483614837457 Marionette TRACE conn4 <- [1,71,null,{"value":null}] 03:13:57 INFO - PROCESS | 3752 | 1483614837491 Marionette TRACE conn4 -> [0,72,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/failures_ECDSA.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/failures_ECDSA.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:13:57 INFO - PROCESS | 3752 | ++DOCSHELL 0FB07C00 == 9 [pid = 3752] [id = 26] 03:13:57 INFO - PROCESS | 3752 | ++DOMWINDOW == 18 (0FB09800) [pid = 3752] [serial = 78] [outer = 00000000] 03:13:57 INFO - PROCESS | 3752 | ++DOMWINDOW == 19 (0FE34400) [pid = 3752] [serial = 79] [outer = 0FB09800] 03:13:57 INFO - PROCESS | 3752 | 1483614837553 Marionette DEBUG loaded listener.js 03:13:57 INFO - PROCESS | 3752 | ++DOMWINDOW == 20 (0FE38000) [pid = 3752] [serial = 80] [outer = 0FB09800] 03:13:57 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:14:06 INFO - PROCESS | 3752 | --DOCSHELL 0F9C6400 == 8 [pid = 3752] [id = 25] 03:14:08 INFO - PROCESS | 3752 | --DOMWINDOW == 19 (0F9C7400) [pid = 3752] [serial = 74] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/failures_ECDH.worker] 03:14:13 INFO - PROCESS | 3752 | --DOMWINDOW == 18 (0FB0A400) [pid = 3752] [serial = 76] [outer = 00000000] [url = about:blank] 03:14:13 INFO - PROCESS | 3752 | --DOMWINDOW == 17 (0FE34400) [pid = 3752] [serial = 79] [outer = 00000000] [url = about:blank] 03:14:26 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:14:26 INFO - PROCESS | 3752 | 1483614866673 Marionette TRACE conn4 <- [1,72,null,{"value":["/WebCryptoAPI/generateKey/failures_ECDSA.worker",1,"Error in worker http://web-platform.test:8000/WebCryptoAPI/generateKey/failures.js: ReferenceError: CryptoKey is not defined",null,[]]}] 03:14:26 INFO - TEST-ERROR | /WebCryptoAPI/generateKey/failures_ECDSA.worker | took 29421ms 03:14:26 INFO - PROCESS | 3752 | 1483614866737 Marionette TRACE conn4 -> [0,73,"getWindowHandle",null] 03:14:26 INFO - PROCESS | 3752 | 1483614866742 Marionette TRACE conn4 <- [1,73,null,{"value":"12"}] 03:14:26 INFO - TEST-START | /WebCryptoAPI/generateKey/failures_HMAC.worker 03:14:26 INFO - PROCESS | 3752 | 1483614866750 Marionette TRACE conn4 -> [0,74,"timeouts",{"script":35000}] 03:14:26 INFO - PROCESS | 3752 | 1483614866754 Marionette TRACE conn4 <- [1,74,null,{}] 03:14:26 INFO - PROCESS | 3752 | 1483614866761 Marionette TRACE conn4 -> [0,75,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:14:26 INFO - PROCESS | 3752 | 1483614866893 Marionette TRACE conn4 <- [1,75,null,{"value":null}] 03:14:26 INFO - PROCESS | 3752 | 1483614866927 Marionette TRACE conn4 -> [0,76,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/failures_HMAC.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/failures_HMAC.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:14:26 INFO - PROCESS | 3752 | ++DOCSHELL 0F9CAC00 == 9 [pid = 3752] [id = 27] 03:14:26 INFO - PROCESS | 3752 | ++DOMWINDOW == 18 (0F9CB400) [pid = 3752] [serial = 81] [outer = 00000000] 03:14:26 INFO - PROCESS | 3752 | ++DOMWINDOW == 19 (0FBB6400) [pid = 3752] [serial = 82] [outer = 0F9CB400] 03:14:26 INFO - PROCESS | 3752 | 1483614866988 Marionette DEBUG loaded listener.js 03:14:27 INFO - PROCESS | 3752 | ++DOMWINDOW == 20 (0FE33800) [pid = 3752] [serial = 83] [outer = 0F9CB400] 03:14:27 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:14:36 INFO - PROCESS | 3752 | --DOCSHELL 0FB07C00 == 8 [pid = 3752] [id = 26] 03:14:38 INFO - PROCESS | 3752 | --DOMWINDOW == 19 (0FB09800) [pid = 3752] [serial = 78] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/failures_ECDSA.worker] 03:14:43 INFO - PROCESS | 3752 | --DOMWINDOW == 18 (0FE38000) [pid = 3752] [serial = 80] [outer = 00000000] [url = about:blank] 03:14:43 INFO - PROCESS | 3752 | --DOMWINDOW == 17 (0FBB6400) [pid = 3752] [serial = 82] [outer = 00000000] [url = about:blank] 03:14:56 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:14:56 INFO - PROCESS | 3752 | 1483614896761 Marionette TRACE conn4 <- [1,76,null,{"value":["/WebCryptoAPI/generateKey/failures_HMAC.worker",1,"Error in worker http://web-platform.test:8000/WebCryptoAPI/generateKey/failures.js: ReferenceError: CryptoKey is not defined",null,[]]}] 03:14:56 INFO - TEST-ERROR | /WebCryptoAPI/generateKey/failures_HMAC.worker | took 30070ms 03:14:56 INFO - PROCESS | 3752 | 1483614896826 Marionette TRACE conn4 -> [0,77,"getWindowHandle",null] 03:14:56 INFO - PROCESS | 3752 | 1483614896832 Marionette TRACE conn4 <- [1,77,null,{"value":"12"}] 03:14:56 INFO - TEST-START | /WebCryptoAPI/generateKey/failures_RSA-OAEP.worker 03:14:56 INFO - PROCESS | 3752 | 1483614896839 Marionette TRACE conn4 -> [0,78,"timeouts",{"script":35000}] 03:14:56 INFO - PROCESS | 3752 | 1483614896843 Marionette TRACE conn4 <- [1,78,null,{}] 03:14:56 INFO - PROCESS | 3752 | 1483614896852 Marionette TRACE conn4 -> [0,79,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:14:56 INFO - PROCESS | 3752 | 1483614896984 Marionette TRACE conn4 <- [1,79,null,{"value":null}] 03:14:57 INFO - PROCESS | 3752 | 1483614897018 Marionette TRACE conn4 -> [0,80,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/failures_RSA-OAEP.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/failures_RSA-OAEP.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:14:57 INFO - PROCESS | 3752 | ++DOCSHELL 0F9C5000 == 9 [pid = 3752] [id = 28] 03:14:57 INFO - PROCESS | 3752 | ++DOMWINDOW == 18 (0F9C6000) [pid = 3752] [serial = 84] [outer = 00000000] 03:14:57 INFO - PROCESS | 3752 | ++DOMWINDOW == 19 (0FB03000) [pid = 3752] [serial = 85] [outer = 0F9C6000] 03:14:57 INFO - PROCESS | 3752 | 1483614897082 Marionette DEBUG loaded listener.js 03:14:57 INFO - PROCESS | 3752 | ++DOMWINDOW == 20 (0FB08000) [pid = 3752] [serial = 86] [outer = 0F9C6000] 03:14:57 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:15:06 INFO - PROCESS | 3752 | --DOCSHELL 0F9CAC00 == 8 [pid = 3752] [id = 27] 03:15:08 INFO - PROCESS | 3752 | --DOMWINDOW == 19 (0F9CB400) [pid = 3752] [serial = 81] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/failures_HMAC.worker] 03:15:13 INFO - PROCESS | 3752 | --DOMWINDOW == 18 (0FE33800) [pid = 3752] [serial = 83] [outer = 00000000] [url = about:blank] 03:15:13 INFO - PROCESS | 3752 | --DOMWINDOW == 17 (0FB03000) [pid = 3752] [serial = 85] [outer = 00000000] [url = about:blank] 03:15:26 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:15:26 INFO - PROCESS | 3752 | 1483614926866 Marionette TRACE conn4 <- [1,80,null,{"value":["/WebCryptoAPI/generateKey/failures_RSA-OAEP.worker",1,"Error in worker http://web-platform.test:8000/WebCryptoAPI/generateKey/failures.js: ReferenceError: CryptoKey is not defined",null,[]]}] 03:15:26 INFO - TEST-ERROR | /WebCryptoAPI/generateKey/failures_RSA-OAEP.worker | took 30070ms 03:15:26 INFO - PROCESS | 3752 | 1483614926916 Marionette TRACE conn4 -> [0,81,"getWindowHandle",null] 03:15:26 INFO - PROCESS | 3752 | 1483614926922 Marionette TRACE conn4 <- [1,81,null,{"value":"12"}] 03:15:26 INFO - TEST-START | /WebCryptoAPI/generateKey/failures_RSA-PSS.worker 03:15:26 INFO - PROCESS | 3752 | 1483614926929 Marionette TRACE conn4 -> [0,82,"timeouts",{"script":35000}] 03:15:26 INFO - PROCESS | 3752 | 1483614926933 Marionette TRACE conn4 <- [1,82,null,{}] 03:15:26 INFO - PROCESS | 3752 | 1483614926941 Marionette TRACE conn4 -> [0,83,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:15:27 INFO - PROCESS | 3752 | 1483614927073 Marionette TRACE conn4 <- [1,83,null,{"value":null}] 03:15:27 INFO - PROCESS | 3752 | 1483614927114 Marionette TRACE conn4 -> [0,84,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/failures_RSA-PSS.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/failures_RSA-PSS.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:15:27 INFO - PROCESS | 3752 | ++DOCSHELL 0F9CA400 == 9 [pid = 3752] [id = 29] 03:15:27 INFO - PROCESS | 3752 | ++DOMWINDOW == 18 (0F9CAC00) [pid = 3752] [serial = 87] [outer = 00000000] 03:15:27 INFO - PROCESS | 3752 | ++DOMWINDOW == 19 (0FB0E000) [pid = 3752] [serial = 88] [outer = 0F9CAC00] 03:15:27 INFO - PROCESS | 3752 | 1483614927178 Marionette DEBUG loaded listener.js 03:15:27 INFO - PROCESS | 3752 | ++DOMWINDOW == 20 (0FBB2400) [pid = 3752] [serial = 89] [outer = 0F9CAC00] 03:15:27 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:15:36 INFO - PROCESS | 3752 | --DOCSHELL 0F9C5000 == 8 [pid = 3752] [id = 28] 03:15:38 INFO - PROCESS | 3752 | --DOMWINDOW == 19 (0F9C6000) [pid = 3752] [serial = 84] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/failures_RSA-OAEP.worker] 03:15:40 INFO - PROCESS | 3752 | ++DOMWINDOW == 20 (0EB94800) [pid = 3752] [serial = 90] [outer = 1AD80400] 03:15:44 INFO - PROCESS | 3752 | --DOMWINDOW == 19 (0FB08000) [pid = 3752] [serial = 86] [outer = 00000000] [url = about:blank] 03:15:44 INFO - PROCESS | 3752 | --DOMWINDOW == 18 (0FB0E000) [pid = 3752] [serial = 88] [outer = 00000000] [url = about:blank] 03:15:50 INFO - PROCESS | 3752 | --DOMWINDOW == 17 (0F68D000) [pid = 3752] [serial = 77] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.] 03:15:56 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:15:56 INFO - PROCESS | 3752 | 1483614956952 Marionette TRACE conn4 <- [1,84,null,{"value":["/WebCryptoAPI/generateKey/failures_RSA-PSS.worker",1,"Error in worker http://web-platform.test:8000/WebCryptoAPI/generateKey/failures.js: ReferenceError: CryptoKey is not defined",null,[]]}] 03:15:56 INFO - TEST-ERROR | /WebCryptoAPI/generateKey/failures_RSA-PSS.worker | took 30070ms 03:15:56 INFO - PROCESS | 3752 | 1483614957006 Marionette TRACE conn4 -> [0,85,"getWindowHandle",null] 03:15:56 INFO - PROCESS | 3752 | 1483614957012 Marionette TRACE conn4 <- [1,85,null,{"value":"12"}] 03:15:56 INFO - TEST-START | /WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.worker 03:15:56 INFO - PROCESS | 3752 | 1483614957019 Marionette TRACE conn4 -> [0,86,"timeouts",{"script":35000}] 03:15:56 INFO - PROCESS | 3752 | 1483614957023 Marionette TRACE conn4 <- [1,86,null,{}] 03:15:57 INFO - PROCESS | 3752 | 1483614957031 Marionette TRACE conn4 -> [0,87,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:15:57 INFO - PROCESS | 3752 | 1483614957146 Marionette TRACE conn4 <- [1,87,null,{"value":null}] 03:15:57 INFO - PROCESS | 3752 | 1483614957180 Marionette TRACE conn4 -> [0,88,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:15:57 INFO - PROCESS | 3752 | ++DOCSHELL 0FB0A800 == 9 [pid = 3752] [id = 30] 03:15:57 INFO - PROCESS | 3752 | ++DOMWINDOW == 18 (0FB0B800) [pid = 3752] [serial = 91] [outer = 00000000] 03:15:57 INFO - PROCESS | 3752 | ++DOMWINDOW == 19 (0FE33400) [pid = 3752] [serial = 92] [outer = 0FB0B800] 03:15:57 INFO - PROCESS | 3752 | 1483614957242 Marionette DEBUG loaded listener.js 03:15:57 INFO - PROCESS | 3752 | ++DOMWINDOW == 20 (0FE35400) [pid = 3752] [serial = 93] [outer = 0FB0B800] 03:15:57 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:16:06 INFO - PROCESS | 3752 | --DOCSHELL 0F9CA400 == 8 [pid = 3752] [id = 29] 03:16:08 INFO - PROCESS | 3752 | --DOMWINDOW == 19 (0F9CAC00) [pid = 3752] [serial = 87] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/failures_RSA-PSS.worker] 03:16:13 INFO - PROCESS | 3752 | --DOMWINDOW == 18 (0FBB2400) [pid = 3752] [serial = 89] [outer = 00000000] [url = about:blank] 03:16:13 INFO - PROCESS | 3752 | --DOMWINDOW == 17 (0FE33400) [pid = 3752] [serial = 92] [outer = 00000000] [url = about:blank] 03:16:26 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:16:27 INFO - PROCESS | 3752 | 1483614987012 Marionette TRACE conn4 <- [1,88,null,{"value":["/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.worker",1,"Error in worker http://web-platform.test:8000/WebCryptoAPI/generateKey/failures.js: ReferenceError: CryptoKey is not defined",null,[]]}] 03:16:27 INFO - TEST-ERROR | /WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.worker | took 30069ms 03:16:27 INFO - PROCESS | 3752 | 1483614987076 Marionette TRACE conn4 -> [0,89,"getWindowHandle",null] 03:16:27 INFO - PROCESS | 3752 | 1483614987082 Marionette TRACE conn4 <- [1,89,null,{"value":"12"}] 03:16:27 INFO - TEST-START | /WebCryptoAPI/generateKey/successes.worker 03:16:27 INFO - PROCESS | 3752 | 1483614987089 Marionette TRACE conn4 -> [0,90,"timeouts",{"script":35000}] 03:16:27 INFO - PROCESS | 3752 | 1483614987093 Marionette TRACE conn4 <- [1,90,null,{}] 03:16:27 INFO - PROCESS | 3752 | 1483614987101 Marionette TRACE conn4 -> [0,91,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:16:27 INFO - PROCESS | 3752 | 1483614987233 Marionette TRACE conn4 <- [1,91,null,{"value":null}] 03:16:27 INFO - PROCESS | 3752 | 1483614987267 Marionette TRACE conn4 -> [0,92,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/successes.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/successes.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:16:27 INFO - PROCESS | 3752 | ++DOCSHELL 0FB02C00 == 9 [pid = 3752] [id = 31] 03:16:27 INFO - PROCESS | 3752 | ++DOMWINDOW == 18 (0FB03000) [pid = 3752] [serial = 94] [outer = 00000000] 03:16:27 INFO - PROCESS | 3752 | ++DOMWINDOW == 19 (0FBB5C00) [pid = 3752] [serial = 95] [outer = 0FB03000] 03:16:27 INFO - PROCESS | 3752 | 1483614987330 Marionette DEBUG loaded listener.js 03:16:27 INFO - PROCESS | 3752 | ++DOMWINDOW == 20 (0FBBB400) [pid = 3752] [serial = 96] [outer = 0FB03000] 03:16:27 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:16:36 INFO - PROCESS | 3752 | --DOCSHELL 0FB0A800 == 8 [pid = 3752] [id = 30] 03:16:38 INFO - PROCESS | 3752 | --DOMWINDOW == 19 (0FB0B800) [pid = 3752] [serial = 91] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.worker] 03:16:43 INFO - PROCESS | 3752 | --DOMWINDOW == 18 (0FE35400) [pid = 3752] [serial = 93] [outer = 00000000] [url = about:blank] 03:16:43 INFO - PROCESS | 3752 | --DOMWINDOW == 17 (0FBB5C00) [pid = 3752] [serial = 95] [outer = 00000000] [url = about:blank] 03:16:57 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:16:57 INFO - PROCESS | 3752 | 1483615017112 Marionette TRACE conn4 <- [1,92,null,{"value":["/WebCryptoAPI/generateKey/successes.worker",1,"Error in worker http://web-platform.test:8000/WebCryptoAPI/generateKey/successes.js: ReferenceError: CryptoKey is not defined",null,[]]}] 03:16:57 INFO - TEST-ERROR | /WebCryptoAPI/generateKey/successes.worker | took 30069ms 03:16:57 INFO - PROCESS | 3752 | 1483615017161 Marionette TRACE conn4 -> [0,93,"getWindowHandle",null] 03:16:57 INFO - PROCESS | 3752 | 1483615017166 Marionette TRACE conn4 <- [1,93,null,{"value":"12"}] 03:16:57 INFO - TEST-START | /WebCryptoAPI/generateKey/successes_AES-CBC.worker 03:16:57 INFO - PROCESS | 3752 | 1483615017173 Marionette TRACE conn4 -> [0,94,"timeouts",{"script":35000}] 03:16:57 INFO - PROCESS | 3752 | 1483615017177 Marionette TRACE conn4 <- [1,94,null,{}] 03:16:57 INFO - PROCESS | 3752 | 1483615017186 Marionette TRACE conn4 -> [0,95,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:16:57 INFO - PROCESS | 3752 | 1483615017318 Marionette TRACE conn4 <- [1,95,null,{"value":null}] 03:16:57 INFO - PROCESS | 3752 | 1483615017352 Marionette TRACE conn4 -> [0,96,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/successes_AES-CBC.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/successes_AES-CBC.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:16:57 INFO - PROCESS | 3752 | ++DOCSHELL 0FB05000 == 9 [pid = 3752] [id = 32] 03:16:57 INFO - PROCESS | 3752 | ++DOMWINDOW == 18 (0FB08000) [pid = 3752] [serial = 97] [outer = 00000000] 03:16:57 INFO - PROCESS | 3752 | ++DOMWINDOW == 19 (0FBB6000) [pid = 3752] [serial = 98] [outer = 0FB08000] 03:16:57 INFO - PROCESS | 3752 | 1483615017415 Marionette DEBUG loaded listener.js 03:16:57 INFO - PROCESS | 3752 | ++DOMWINDOW == 20 (0FBB8400) [pid = 3752] [serial = 99] [outer = 0FB08000] 03:16:57 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:17:06 INFO - PROCESS | 3752 | --DOCSHELL 0FB02C00 == 8 [pid = 3752] [id = 31] 03:17:08 INFO - PROCESS | 3752 | --DOMWINDOW == 19 (0FB03000) [pid = 3752] [serial = 94] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/successes.worker] 03:17:13 INFO - PROCESS | 3752 | --DOMWINDOW == 18 (0FBBB400) [pid = 3752] [serial = 96] [outer = 00000000] [url = about:blank] 03:17:13 INFO - PROCESS | 3752 | --DOMWINDOW == 17 (0FBB6000) [pid = 3752] [serial = 98] [outer = 00000000] [url = about:blank] 03:17:27 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:17:27 INFO - PROCESS | 3752 | 1483615047197 Marionette TRACE conn4 <- [1,96,null,{"value":["/WebCryptoAPI/generateKey/successes_AES-CBC.worker",1,"Error in worker http://web-platform.test:8000/WebCryptoAPI/generateKey/successes.js: ReferenceError: CryptoKey is not defined",null,[]]}] 03:17:27 INFO - TEST-ERROR | /WebCryptoAPI/generateKey/successes_AES-CBC.worker | took 30069ms 03:17:27 INFO - PROCESS | 3752 | 1483615047246 Marionette TRACE conn4 -> [0,97,"getWindowHandle",null] 03:17:27 INFO - PROCESS | 3752 | 1483615047252 Marionette TRACE conn4 <- [1,97,null,{"value":"12"}] 03:17:27 INFO - TEST-START | /WebCryptoAPI/generateKey/successes_AES-CTR.worker 03:17:27 INFO - PROCESS | 3752 | 1483615047259 Marionette TRACE conn4 -> [0,98,"timeouts",{"script":35000}] 03:17:27 INFO - PROCESS | 3752 | 1483615047263 Marionette TRACE conn4 <- [1,98,null,{}] 03:17:27 INFO - PROCESS | 3752 | 1483615047271 Marionette TRACE conn4 -> [0,99,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:17:27 INFO - PROCESS | 3752 | 1483615047409 Marionette TRACE conn4 <- [1,99,null,{"value":null}] 03:17:27 INFO - PROCESS | 3752 | 1483615047444 Marionette TRACE conn4 -> [0,100,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/successes_AES-CTR.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/successes_AES-CTR.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:17:27 INFO - PROCESS | 3752 | ++DOCSHELL 0FB03000 == 9 [pid = 3752] [id = 33] 03:17:27 INFO - PROCESS | 3752 | ++DOMWINDOW == 18 (0FB07C00) [pid = 3752] [serial = 100] [outer = 00000000] 03:17:27 INFO - PROCESS | 3752 | ++DOMWINDOW == 19 (0FBB6400) [pid = 3752] [serial = 101] [outer = 0FB07C00] 03:17:27 INFO - PROCESS | 3752 | 1483615047506 Marionette DEBUG loaded listener.js 03:17:27 INFO - PROCESS | 3752 | ++DOMWINDOW == 20 (0FBBB400) [pid = 3752] [serial = 102] [outer = 0FB07C00] 03:17:27 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:17:36 INFO - PROCESS | 3752 | --DOCSHELL 0FB05000 == 8 [pid = 3752] [id = 32] 03:17:38 INFO - PROCESS | 3752 | --DOMWINDOW == 19 (0FB08000) [pid = 3752] [serial = 97] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/successes_AES-CBC.worker] 03:17:43 INFO - PROCESS | 3752 | --DOMWINDOW == 18 (0FBB8400) [pid = 3752] [serial = 99] [outer = 00000000] [url = about:blank] 03:17:43 INFO - PROCESS | 3752 | --DOMWINDOW == 17 (0FBB6400) [pid = 3752] [serial = 101] [outer = 00000000] [url = about:blank] 03:17:57 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:17:57 INFO - PROCESS | 3752 | 1483615077282 Marionette TRACE conn4 <- [1,100,null,{"value":["/WebCryptoAPI/generateKey/successes_AES-CTR.worker",1,"Error in worker http://web-platform.test:8000/WebCryptoAPI/generateKey/successes.js: ReferenceError: CryptoKey is not defined",null,[]]}] 03:17:57 INFO - TEST-ERROR | /WebCryptoAPI/generateKey/successes_AES-CTR.worker | took 30069ms 03:17:57 INFO - PROCESS | 3752 | 1483615077331 Marionette TRACE conn4 -> [0,101,"getWindowHandle",null] 03:17:57 INFO - TEST-START | /WebCryptoAPI/generateKey/successes_AES-GCM.worker 03:17:57 INFO - PROCESS | 3752 | 1483615077337 Marionette TRACE conn4 <- [1,101,null,{"value":"12"}] 03:17:57 INFO - PROCESS | 3752 | 1483615077344 Marionette TRACE conn4 -> [0,102,"timeouts",{"script":35000}] 03:17:57 INFO - PROCESS | 3752 | 1483615077347 Marionette TRACE conn4 <- [1,102,null,{}] 03:17:57 INFO - PROCESS | 3752 | 1483615077355 Marionette TRACE conn4 -> [0,103,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:17:57 INFO - PROCESS | 3752 | 1483615077486 Marionette TRACE conn4 <- [1,103,null,{"value":null}] 03:17:57 INFO - PROCESS | 3752 | 1483615077519 Marionette TRACE conn4 -> [0,104,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/successes_AES-GCM.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/successes_AES-GCM.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:17:57 INFO - PROCESS | 3752 | ++DOCSHELL 0FB08400 == 9 [pid = 3752] [id = 34] 03:17:57 INFO - PROCESS | 3752 | ++DOMWINDOW == 18 (0FB09800) [pid = 3752] [serial = 103] [outer = 00000000] 03:17:57 INFO - PROCESS | 3752 | ++DOMWINDOW == 19 (0FBB8000) [pid = 3752] [serial = 104] [outer = 0FB09800] 03:17:57 INFO - PROCESS | 3752 | 1483615077583 Marionette DEBUG loaded listener.js 03:17:57 INFO - PROCESS | 3752 | ++DOMWINDOW == 20 (0FE33800) [pid = 3752] [serial = 105] [outer = 0FB09800] 03:17:57 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:18:06 INFO - PROCESS | 3752 | --DOCSHELL 0FB03000 == 8 [pid = 3752] [id = 33] 03:18:08 INFO - PROCESS | 3752 | --DOCSHELL 19AC3800 == 7 [pid = 3752] [id = 11] 03:18:08 INFO - PROCESS | 3752 | --DOMWINDOW == 19 (0FB07C00) [pid = 3752] [serial = 100] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/successes_AES-CTR.worker] 03:18:14 INFO - PROCESS | 3752 | --DOCSHELL 184C2000 == 6 [pid = 3752] [id = 12] 03:18:14 INFO - PROCESS | 3752 | --DOMWINDOW == 18 (0FBBB400) [pid = 3752] [serial = 102] [outer = 00000000] [url = about:blank] 03:18:14 INFO - PROCESS | 3752 | --DOMWINDOW == 17 (0FBB8000) [pid = 3752] [serial = 104] [outer = 00000000] [url = about:blank] 03:18:16 INFO - PROCESS | 3752 | --DOMWINDOW == 16 (1AD80400) [pid = 3752] [serial = 33] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.] 03:18:16 INFO - PROCESS | 3752 | --DOMWINDOW == 15 (19AC3C00) [pid = 3752] [serial = 30] [outer = 00000000] [url = data:application/vnd.mozilla.xul+xml;charset=utf-8,] 03:18:21 INFO - PROCESS | 3752 | --DOMWINDOW == 14 (0EB94800) [pid = 3752] [serial = 90] [outer = 00000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.] 03:18:21 INFO - PROCESS | 3752 | --DOMWINDOW == 13 (1AD79800) [pid = 3752] [serial = 32] [outer = 00000000] [url = data:application/vnd.mozilla.xul+xml;charset=utf-8,] 03:18:27 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:18:27 INFO - PROCESS | 3752 | 1483615107352 Marionette TRACE conn4 <- [1,104,null,{"value":["/WebCryptoAPI/generateKey/successes_AES-GCM.worker",1,"Error in worker http://web-platform.test:8000/WebCryptoAPI/generateKey/successes.js: ReferenceError: CryptoKey is not defined",null,[]]}] 03:18:27 INFO - TEST-ERROR | /WebCryptoAPI/generateKey/successes_AES-GCM.worker | took 30069ms 03:18:27 INFO - PROCESS | 3752 | 1483615107416 Marionette TRACE conn4 -> [0,105,"getWindowHandle",null] 03:18:27 INFO - PROCESS | 3752 | 1483615107422 Marionette TRACE conn4 <- [1,105,null,{"value":"12"}] 03:18:27 INFO - TEST-START | /WebCryptoAPI/generateKey/successes_AES-KW.worker 03:18:27 INFO - PROCESS | 3752 | 1483615107429 Marionette TRACE conn4 -> [0,106,"timeouts",{"script":35000}] 03:18:27 INFO - PROCESS | 3752 | 1483615107433 Marionette TRACE conn4 <- [1,106,null,{}] 03:18:27 INFO - PROCESS | 3752 | 1483615107441 Marionette TRACE conn4 -> [0,107,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:18:27 INFO - PROCESS | 3752 | 1483615107571 Marionette TRACE conn4 <- [1,107,null,{"value":null}] 03:18:27 INFO - PROCESS | 3752 | 1483615107604 Marionette TRACE conn4 -> [0,108,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/successes_AES-KW.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/successes_AES-KW.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:18:27 INFO - PROCESS | 3752 | ++DOCSHELL 0F9C4400 == 7 [pid = 3752] [id = 35] 03:18:27 INFO - PROCESS | 3752 | ++DOMWINDOW == 14 (0F9C4800) [pid = 3752] [serial = 106] [outer = 00000000] 03:18:27 INFO - PROCESS | 3752 | ++DOMWINDOW == 15 (0FB02C00) [pid = 3752] [serial = 107] [outer = 0F9C4800] 03:18:27 INFO - PROCESS | 3752 | 1483615107667 Marionette DEBUG loaded listener.js 03:18:27 INFO - PROCESS | 3752 | ++DOMWINDOW == 16 (0FB07C00) [pid = 3752] [serial = 108] [outer = 0F9C4800] 03:18:27 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:18:36 INFO - PROCESS | 3752 | --DOCSHELL 0FB08400 == 6 [pid = 3752] [id = 34] 03:18:38 INFO - PROCESS | 3752 | --DOMWINDOW == 15 (0FB09800) [pid = 3752] [serial = 103] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/successes_AES-GCM.worker] 03:18:44 INFO - PROCESS | 3752 | --DOMWINDOW == 14 (0FE33800) [pid = 3752] [serial = 105] [outer = 00000000] [url = about:blank] 03:18:44 INFO - PROCESS | 3752 | --DOMWINDOW == 13 (0FB02C00) [pid = 3752] [serial = 107] [outer = 00000000] [url = about:blank] 03:18:57 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:18:57 INFO - PROCESS | 3752 | 1483615137437 Marionette TRACE conn4 <- [1,108,null,{"value":["/WebCryptoAPI/generateKey/successes_AES-KW.worker",1,"Error in worker http://web-platform.test:8000/WebCryptoAPI/generateKey/successes.js: ReferenceError: CryptoKey is not defined",null,[]]}] 03:18:57 INFO - TEST-ERROR | /WebCryptoAPI/generateKey/successes_AES-KW.worker | took 30069ms 03:18:57 INFO - PROCESS | 3752 | 1483615137501 Marionette TRACE conn4 -> [0,109,"getWindowHandle",null] 03:18:57 INFO - PROCESS | 3752 | 1483615137507 Marionette TRACE conn4 <- [1,109,null,{"value":"12"}] 03:18:57 INFO - TEST-START | /WebCryptoAPI/generateKey/successes_ECDH.worker 03:18:57 INFO - PROCESS | 3752 | 1483615137514 Marionette TRACE conn4 -> [0,110,"timeouts",{"script":35000}] 03:18:57 INFO - PROCESS | 3752 | 1483615137518 Marionette TRACE conn4 <- [1,110,null,{}] 03:18:57 INFO - PROCESS | 3752 | 1483615137525 Marionette TRACE conn4 -> [0,111,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:18:57 INFO - PROCESS | 3752 | 1483615137657 Marionette TRACE conn4 <- [1,111,null,{"value":null}] 03:18:57 INFO - PROCESS | 3752 | 1483615137690 Marionette TRACE conn4 -> [0,112,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/successes_ECDH.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/successes_ECDH.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:18:57 INFO - PROCESS | 3752 | ++DOCSHELL 0F9C9C00 == 7 [pid = 3752] [id = 36] 03:18:57 INFO - PROCESS | 3752 | ++DOMWINDOW == 14 (0F9CA000) [pid = 3752] [serial = 109] [outer = 00000000] 03:18:57 INFO - PROCESS | 3752 | ++DOMWINDOW == 15 (0FB0B800) [pid = 3752] [serial = 110] [outer = 0F9CA000] 03:18:57 INFO - PROCESS | 3752 | 1483615137752 Marionette DEBUG loaded listener.js 03:18:57 INFO - PROCESS | 3752 | ++DOMWINDOW == 16 (0FBB1800) [pid = 3752] [serial = 111] [outer = 0F9CA000] 03:18:57 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:19:06 INFO - PROCESS | 3752 | --DOCSHELL 0F9C4400 == 6 [pid = 3752] [id = 35] 03:19:09 INFO - PROCESS | 3752 | --DOMWINDOW == 15 (0F9C4800) [pid = 3752] [serial = 106] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/successes_AES-KW.worker] 03:19:14 INFO - PROCESS | 3752 | --DOMWINDOW == 14 (0FB07C00) [pid = 3752] [serial = 108] [outer = 00000000] [url = about:blank] 03:19:14 INFO - PROCESS | 3752 | --DOMWINDOW == 13 (0FB0B800) [pid = 3752] [serial = 110] [outer = 00000000] [url = about:blank] 03:19:27 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:19:27 INFO - PROCESS | 3752 | 1483615167571 Marionette TRACE conn4 <- [1,112,null,{"value":["/WebCryptoAPI/generateKey/successes_ECDH.worker",1,"Error in worker http://web-platform.test:8000/WebCryptoAPI/generateKey/successes.js: ReferenceError: CryptoKey is not defined",null,[]]}] 03:19:27 INFO - TEST-ERROR | /WebCryptoAPI/generateKey/successes_ECDH.worker | took 30119ms 03:19:27 INFO - PROCESS | 3752 | 1483615167636 Marionette TRACE conn4 -> [0,113,"getWindowHandle",null] 03:19:27 INFO - PROCESS | 3752 | 1483615167642 Marionette TRACE conn4 <- [1,113,null,{"value":"12"}] 03:19:27 INFO - TEST-START | /WebCryptoAPI/generateKey/successes_ECDSA.worker 03:19:27 INFO - PROCESS | 3752 | 1483615167649 Marionette TRACE conn4 -> [0,114,"timeouts",{"script":35000}] 03:19:27 INFO - PROCESS | 3752 | 1483615167653 Marionette TRACE conn4 <- [1,114,null,{}] 03:19:27 INFO - PROCESS | 3752 | 1483615167661 Marionette TRACE conn4 -> [0,115,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:19:27 INFO - PROCESS | 3752 | 1483615167800 Marionette TRACE conn4 <- [1,115,null,{"value":null}] 03:19:27 INFO - PROCESS | 3752 | 1483615167834 Marionette TRACE conn4 -> [0,116,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/successes_ECDSA.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/successes_ECDSA.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:19:27 INFO - PROCESS | 3752 | ++DOCSHELL 0F9C8000 == 7 [pid = 3752] [id = 37] 03:19:27 INFO - PROCESS | 3752 | ++DOMWINDOW == 14 (0F9CA400) [pid = 3752] [serial = 112] [outer = 00000000] 03:19:27 INFO - PROCESS | 3752 | ++DOMWINDOW == 15 (0FB0A400) [pid = 3752] [serial = 113] [outer = 0F9CA400] 03:19:27 INFO - PROCESS | 3752 | 1483615167898 Marionette DEBUG loaded listener.js 03:19:27 INFO - PROCESS | 3752 | ++DOMWINDOW == 16 (0FB0E000) [pid = 3752] [serial = 114] [outer = 0F9CA400] 03:19:28 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:19:37 INFO - PROCESS | 3752 | --DOCSHELL 0F9C9C00 == 6 [pid = 3752] [id = 36] 03:19:39 INFO - PROCESS | 3752 | --DOMWINDOW == 15 (0F9CA000) [pid = 3752] [serial = 109] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/successes_ECDH.worker] 03:19:44 INFO - PROCESS | 3752 | --DOMWINDOW == 14 (0FBB1800) [pid = 3752] [serial = 111] [outer = 00000000] [url = about:blank] 03:19:44 INFO - PROCESS | 3752 | --DOMWINDOW == 13 (0FB0A400) [pid = 3752] [serial = 113] [outer = 00000000] [url = about:blank] 03:19:57 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:19:57 INFO - PROCESS | 3752 | 1483615197914 Marionette TRACE conn4 <- [1,116,null,{"value":["/WebCryptoAPI/generateKey/successes_ECDSA.worker",1,"Error in worker http://web-platform.test:8000/WebCryptoAPI/generateKey/successes.js: ReferenceError: CryptoKey is not defined",null,[]]}] 03:19:57 INFO - TEST-ERROR | /WebCryptoAPI/generateKey/successes_ECDSA.worker | took 30315ms 03:19:57 INFO - PROCESS | 3752 | 1483615197968 Marionette TRACE conn4 -> [0,117,"getWindowHandle",null] 03:19:57 INFO - PROCESS | 3752 | 1483615197974 Marionette TRACE conn4 <- [1,117,null,{"value":"12"}] 03:19:57 INFO - TEST-START | /WebCryptoAPI/generateKey/successes_HMAC.worker 03:19:57 INFO - PROCESS | 3752 | 1483615197981 Marionette TRACE conn4 -> [0,118,"timeouts",{"script":35000}] 03:19:57 INFO - PROCESS | 3752 | 1483615197985 Marionette TRACE conn4 <- [1,118,null,{}] 03:19:57 INFO - PROCESS | 3752 | 1483615197993 Marionette TRACE conn4 -> [0,119,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:19:58 INFO - PROCESS | 3752 | 1483615198125 Marionette TRACE conn4 <- [1,119,null,{"value":null}] 03:19:58 INFO - PROCESS | 3752 | 1483615198159 Marionette TRACE conn4 -> [0,120,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/successes_HMAC.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/successes_HMAC.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:19:58 INFO - PROCESS | 3752 | ++DOCSHELL 0F9CA000 == 7 [pid = 3752] [id = 38] 03:19:58 INFO - PROCESS | 3752 | ++DOMWINDOW == 14 (0F9CAC00) [pid = 3752] [serial = 115] [outer = 00000000] 03:19:58 INFO - PROCESS | 3752 | ++DOMWINDOW == 15 (0FB0B800) [pid = 3752] [serial = 116] [outer = 0F9CAC00] 03:19:58 INFO - PROCESS | 3752 | 1483615198222 Marionette DEBUG loaded listener.js 03:19:58 INFO - PROCESS | 3752 | ++DOMWINDOW == 16 (0FBB2400) [pid = 3752] [serial = 117] [outer = 0F9CAC00] 03:19:58 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:20:07 INFO - PROCESS | 3752 | --DOCSHELL 0F9C8000 == 6 [pid = 3752] [id = 37] 03:20:09 INFO - PROCESS | 3752 | --DOMWINDOW == 15 (0F9CA400) [pid = 3752] [serial = 112] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/successes_ECDSA.worker] 03:20:14 INFO - PROCESS | 3752 | --DOMWINDOW == 14 (0FB0E000) [pid = 3752] [serial = 114] [outer = 00000000] [url = about:blank] 03:20:14 INFO - PROCESS | 3752 | --DOMWINDOW == 13 (0FB0B800) [pid = 3752] [serial = 116] [outer = 00000000] [url = about:blank] 03:20:28 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:20:28 INFO - PROCESS | 3752 | 1483615228238 Marionette TRACE conn4 <- [1,120,null,{"value":["/WebCryptoAPI/generateKey/successes_HMAC.worker",1,"Error in worker http://web-platform.test:8000/WebCryptoAPI/generateKey/successes.js: ReferenceError: CryptoKey is not defined",null,[]]}] 03:20:28 INFO - TEST-ERROR | /WebCryptoAPI/generateKey/successes_HMAC.worker | took 30315ms 03:20:28 INFO - PROCESS | 3752 | 1483615228301 Marionette TRACE conn4 -> [0,121,"getWindowHandle",null] 03:20:28 INFO - PROCESS | 3752 | 1483615228306 Marionette TRACE conn4 <- [1,121,null,{"value":"12"}] 03:20:28 INFO - TEST-START | /WebCryptoAPI/generateKey/successes_RSA-OAEP.worker 03:20:28 INFO - PROCESS | 3752 | 1483615228313 Marionette TRACE conn4 -> [0,122,"timeouts",{"script":35000}] 03:20:28 INFO - PROCESS | 3752 | 1483615228317 Marionette TRACE conn4 <- [1,122,null,{}] 03:20:28 INFO - PROCESS | 3752 | 1483615228325 Marionette TRACE conn4 -> [0,123,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:20:28 INFO - PROCESS | 3752 | 1483615228466 Marionette TRACE conn4 <- [1,123,null,{"value":null}] 03:20:28 INFO - PROCESS | 3752 | 1483615228499 Marionette TRACE conn4 -> [0,124,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/successes_RSA-OAEP.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/successes_RSA-OAEP.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:20:28 INFO - PROCESS | 3752 | ++DOCSHELL 0F9CA400 == 7 [pid = 3752] [id = 39] 03:20:28 INFO - PROCESS | 3752 | ++DOMWINDOW == 14 (0F9CB000) [pid = 3752] [serial = 118] [outer = 00000000] 03:20:28 INFO - PROCESS | 3752 | ++DOMWINDOW == 15 (0FB0B800) [pid = 3752] [serial = 119] [outer = 0F9CB000] 03:20:28 INFO - PROCESS | 3752 | 1483615228563 Marionette DEBUG loaded listener.js 03:20:28 INFO - PROCESS | 3752 | ++DOMWINDOW == 16 (0FBB1800) [pid = 3752] [serial = 120] [outer = 0F9CB000] 03:20:28 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:20:37 INFO - PROCESS | 3752 | --DOCSHELL 0F9CA000 == 6 [pid = 3752] [id = 38] 03:20:39 INFO - PROCESS | 3752 | --DOMWINDOW == 15 (0F9CAC00) [pid = 3752] [serial = 115] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/successes_HMAC.worker] 03:20:45 INFO - PROCESS | 3752 | --DOMWINDOW == 14 (0FBB2400) [pid = 3752] [serial = 117] [outer = 00000000] [url = about:blank] 03:20:45 INFO - PROCESS | 3752 | --DOMWINDOW == 13 (0FB0B800) [pid = 3752] [serial = 119] [outer = 00000000] [url = about:blank] 03:20:58 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:20:58 INFO - PROCESS | 3752 | 1483615258573 Marionette TRACE conn4 <- [1,124,null,{"value":["/WebCryptoAPI/generateKey/successes_RSA-OAEP.worker",1,"Error in worker http://web-platform.test:8000/WebCryptoAPI/generateKey/successes.js: ReferenceError: CryptoKey is not defined",null,[]]}] 03:20:58 INFO - TEST-ERROR | /WebCryptoAPI/generateKey/successes_RSA-OAEP.worker | took 30315ms 03:20:58 INFO - PROCESS | 3752 | 1483615258628 Marionette TRACE conn4 -> [0,125,"getWindowHandle",null] 03:20:58 INFO - PROCESS | 3752 | 1483615258633 Marionette TRACE conn4 <- [1,125,null,{"value":"12"}] 03:20:58 INFO - TEST-START | /WebCryptoAPI/generateKey/successes_RSA-PSS.worker 03:20:58 INFO - PROCESS | 3752 | 1483615258640 Marionette TRACE conn4 -> [0,126,"timeouts",{"script":35000}] 03:20:58 INFO - PROCESS | 3752 | 1483615258644 Marionette TRACE conn4 <- [1,126,null,{}] 03:20:58 INFO - PROCESS | 3752 | 1483615258652 Marionette TRACE conn4 -> [0,127,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:20:58 INFO - PROCESS | 3752 | 1483615258783 Marionette TRACE conn4 <- [1,127,null,{"value":null}] 03:20:58 INFO - PROCESS | 3752 | 1483615258816 Marionette TRACE conn4 -> [0,128,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/successes_RSA-PSS.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/successes_RSA-PSS.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:20:58 INFO - PROCESS | 3752 | ++DOCSHELL 0F9C7800 == 7 [pid = 3752] [id = 40] 03:20:58 INFO - PROCESS | 3752 | ++DOMWINDOW == 14 (0F9C9800) [pid = 3752] [serial = 121] [outer = 00000000] 03:20:58 INFO - PROCESS | 3752 | ++DOMWINDOW == 15 (0FB0A400) [pid = 3752] [serial = 122] [outer = 0F9C9800] 03:20:58 INFO - PROCESS | 3752 | 1483615258879 Marionette DEBUG loaded listener.js 03:20:58 INFO - PROCESS | 3752 | ++DOMWINDOW == 16 (0FB0E000) [pid = 3752] [serial = 123] [outer = 0F9C9800] 03:20:59 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:21:08 INFO - PROCESS | 3752 | --DOCSHELL 0F9CA400 == 6 [pid = 3752] [id = 39] 03:21:10 INFO - PROCESS | 3752 | --DOMWINDOW == 15 (0F9CB000) [pid = 3752] [serial = 118] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/successes_RSA-OAEP.worker] 03:21:15 INFO - PROCESS | 3752 | --DOMWINDOW == 14 (0FBB1800) [pid = 3752] [serial = 120] [outer = 00000000] [url = about:blank] 03:21:15 INFO - PROCESS | 3752 | --DOMWINDOW == 13 (0FB0A400) [pid = 3752] [serial = 122] [outer = 00000000] [url = about:blank] 03:21:28 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:21:28 INFO - PROCESS | 3752 | 1483615288910 Marionette TRACE conn4 <- [1,128,null,{"value":["/WebCryptoAPI/generateKey/successes_RSA-PSS.worker",1,"Error in worker http://web-platform.test:8000/WebCryptoAPI/generateKey/successes.js: ReferenceError: CryptoKey is not defined",null,[]]}] 03:21:28 INFO - TEST-ERROR | /WebCryptoAPI/generateKey/successes_RSA-PSS.worker | took 30320ms 03:21:28 INFO - PROCESS | 3752 | 1483615288973 Marionette TRACE conn4 -> [0,129,"getWindowHandle",null] 03:21:28 INFO - PROCESS | 3752 | 1483615288979 Marionette TRACE conn4 <- [1,129,null,{"value":"12"}] 03:21:28 INFO - TEST-START | /WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.worker 03:21:28 INFO - PROCESS | 3752 | 1483615288986 Marionette TRACE conn4 -> [0,130,"timeouts",{"script":35000}] 03:21:28 INFO - PROCESS | 3752 | 1483615288990 Marionette TRACE conn4 <- [1,130,null,{}] 03:21:28 INFO - PROCESS | 3752 | 1483615288998 Marionette TRACE conn4 -> [0,131,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:21:29 INFO - PROCESS | 3752 | 1483615289128 Marionette TRACE conn4 <- [1,131,null,{"value":null}] 03:21:29 INFO - PROCESS | 3752 | 1483615289161 Marionette TRACE conn4 -> [0,132,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:21:29 INFO - PROCESS | 3752 | ++DOCSHELL 0F9CB000 == 7 [pid = 3752] [id = 41] 03:21:29 INFO - PROCESS | 3752 | ++DOMWINDOW == 14 (0F9CB400) [pid = 3752] [serial = 124] [outer = 00000000] 03:21:29 INFO - PROCESS | 3752 | ++DOMWINDOW == 15 (0FB0D400) [pid = 3752] [serial = 125] [outer = 0F9CB400] 03:21:29 INFO - PROCESS | 3752 | 1483615289224 Marionette DEBUG loaded listener.js 03:21:29 INFO - PROCESS | 3752 | ++DOMWINDOW == 16 (0FBB3000) [pid = 3752] [serial = 126] [outer = 0F9CB400] 03:21:29 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:21:38 INFO - PROCESS | 3752 | --DOCSHELL 0F9C7800 == 6 [pid = 3752] [id = 40] 03:21:40 INFO - PROCESS | 3752 | --DOMWINDOW == 15 (0F9C9800) [pid = 3752] [serial = 121] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/successes_RSA-PSS.worker] 03:21:45 INFO - PROCESS | 3752 | --DOMWINDOW == 14 (0FB0E000) [pid = 3752] [serial = 123] [outer = 00000000] [url = about:blank] 03:21:45 INFO - PROCESS | 3752 | --DOMWINDOW == 13 (0FB0D400) [pid = 3752] [serial = 125] [outer = 00000000] [url = about:blank] 03:21:59 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:21:59 INFO - PROCESS | 3752 | 1483615319276 Marionette TRACE conn4 <- [1,132,null,{"value":["/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.worker",1,"Error in worker http://web-platform.test:8000/WebCryptoAPI/generateKey/successes.js: ReferenceError: CryptoKey is not defined",null,[]]}] 03:21:59 INFO - TEST-ERROR | /WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.worker | took 30355ms 03:21:59 INFO - PROCESS | 3752 | 1483615319342 Marionette TRACE conn4 -> [0,133,"getWindowHandle",null] 03:21:59 INFO - PROCESS | 3752 | 1483615319348 Marionette TRACE conn4 <- [1,133,null,{"value":"12"}] 03:21:59 INFO - TEST-START | /WebCryptoAPI/generateKey/test_aes-cbc.html 03:21:59 INFO - PROCESS | 3752 | 1483615319355 Marionette TRACE conn4 -> [0,134,"timeouts",{"script":185000}] 03:21:59 INFO - PROCESS | 3752 | 1483615319359 Marionette TRACE conn4 <- [1,134,null,{}] 03:21:59 INFO - PROCESS | 3752 | 1483615319367 Marionette TRACE conn4 -> [0,135,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:21:59 INFO - PROCESS | 3752 | 1483615319497 Marionette TRACE conn4 <- [1,135,null,{"value":null}] 03:21:59 INFO - PROCESS | 3752 | 1483615319531 Marionette TRACE conn4 -> [0,136,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/test_aes-cbc.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/test_aes-cbc.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:21:59 INFO - PROCESS | 3752 | ++DOCSHELL 0F9C9800 == 7 [pid = 3752] [id = 42] 03:21:59 INFO - PROCESS | 3752 | ++DOMWINDOW == 14 (0F9C9C00) [pid = 3752] [serial = 127] [outer = 00000000] 03:21:59 INFO - PROCESS | 3752 | ++DOMWINDOW == 15 (0FB0B800) [pid = 3752] [serial = 128] [outer = 0F9C9C00] 03:21:59 INFO - PROCESS | 3752 | 1483615319594 Marionette DEBUG loaded listener.js 03:21:59 INFO - PROCESS | 3752 | ++DOMWINDOW == 16 (0FBB1800) [pid = 3752] [serial = 129] [outer = 0F9C9C00] 03:22:00 INFO - PROCESS | 3752 | 1483615320729 Marionette TRACE conn4 <- [1,136,null,{"value":["/WebCryptoAPI/generateKey/test_aes-cbc.html",0,null,null,[["Success: generateKey({length: 128, name: AES-CBC}, false, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, true, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, false, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, true, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, false, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, true, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, false, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, true, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, false, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, true, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, false, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, true, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, false, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, true, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, false, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, true, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, false, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, true, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, false, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, true, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, false, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, true, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, false, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, true, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, false, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, true, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, false, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, true, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, false, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, true, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, false, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, true, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, false, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, true, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, false, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, true, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null]]]}] 03:22:00 INFO - ................................................................................................................................................................................................................................................................................................ 03:22:00 INFO - TEST-OK | /WebCryptoAPI/generateKey/test_aes-cbc.html | took 1543ms 03:22:00 INFO - PROCESS | 3752 | 1483615320906 Marionette TRACE conn4 -> [0,137,"getWindowHandle",null] 03:22:00 INFO - PROCESS | 3752 | 1483615320913 Marionette TRACE conn4 <- [1,137,null,{"value":"12"}] 03:22:00 INFO - TEST-START | /WebCryptoAPI/generateKey/test_aes-ctr.html 03:22:00 INFO - PROCESS | 3752 | 1483615320920 Marionette TRACE conn4 -> [0,138,"timeouts",{"script":185000}] 03:22:00 INFO - PROCESS | 3752 | 1483615320925 Marionette TRACE conn4 <- [1,138,null,{}] 03:22:00 INFO - PROCESS | 3752 | 1483615320929 Marionette TRACE conn4 -> [0,139,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:01 INFO - PROCESS | 3752 | 1483615321048 Marionette TRACE conn4 <- [1,139,null,{"value":null}] 03:22:01 INFO - PROCESS | 3752 | 1483615321057 Marionette TRACE conn4 -> [0,140,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/test_aes-ctr.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/test_aes-ctr.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:01 INFO - PROCESS | 3752 | ++DOCSHELL 112A0800 == 8 [pid = 3752] [id = 43] 03:22:01 INFO - PROCESS | 3752 | ++DOMWINDOW == 17 (112A1C00) [pid = 3752] [serial = 130] [outer = 00000000] 03:22:01 INFO - PROCESS | 3752 | ++DOMWINDOW == 18 (11CAC800) [pid = 3752] [serial = 131] [outer = 112A1C00] 03:22:01 INFO - PROCESS | 3752 | 1483615321112 Marionette DEBUG loaded listener.js 03:22:01 INFO - PROCESS | 3752 | ++DOMWINDOW == 19 (11CB6800) [pid = 3752] [serial = 132] [outer = 112A1C00] 03:22:02 INFO - PROCESS | 3752 | 1483615322229 Marionette TRACE conn4 <- [1,140,null,{"value":["/WebCryptoAPI/generateKey/test_aes-ctr.html",0,null,null,[["Success: generateKey({length: 128, name: AES-CTR}, false, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null]]]}] 03:22:02 INFO - ................................................................................................................................................................................................................................................................................................ 03:22:02 INFO - TEST-OK | /WebCryptoAPI/generateKey/test_aes-ctr.html | took 1481ms 03:22:02 INFO - PROCESS | 3752 | 1483615322389 Marionette TRACE conn4 -> [0,141,"getWindowHandle",null] 03:22:02 INFO - PROCESS | 3752 | 1483615322392 Marionette TRACE conn4 <- [1,141,null,{"value":"12"}] 03:22:02 INFO - TEST-START | /WebCryptoAPI/generateKey/test_failures_AES-CBC.html 03:22:02 INFO - PROCESS | 3752 | 1483615322413 Marionette TRACE conn4 -> [0,142,"timeouts",{"script":185000}] 03:22:02 INFO - PROCESS | 3752 | 1483615322418 Marionette TRACE conn4 <- [1,142,null,{}] 03:22:02 INFO - PROCESS | 3752 | 1483615322432 Marionette TRACE conn4 -> [0,143,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:02 INFO - PROCESS | 3752 | 1483615322561 Marionette TRACE conn4 <- [1,143,null,{"value":null}] 03:22:02 INFO - PROCESS | 3752 | 1483615322572 Marionette TRACE conn4 -> [0,144,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/test_failures_AES-CBC.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/test_failures_AES-CBC.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:02 INFO - PROCESS | 3752 | ++DOCSHELL 12898800 == 9 [pid = 3752] [id = 44] 03:22:02 INFO - PROCESS | 3752 | ++DOMWINDOW == 20 (12B1DC00) [pid = 3752] [serial = 133] [outer = 00000000] 03:22:02 INFO - PROCESS | 3752 | ++DOMWINDOW == 21 (12BFCC00) [pid = 3752] [serial = 134] [outer = 12B1DC00] 03:22:02 INFO - PROCESS | 3752 | 1483615322632 Marionette DEBUG loaded listener.js 03:22:02 INFO - PROCESS | 3752 | ++DOMWINDOW == 22 (12BFB800) [pid = 3752] [serial = 135] [outer = 12B1DC00] 03:22:05 INFO - PROCESS | 3752 | 1483615325778 Marionette TRACE conn4 <- [1,144,null,{"value":["/WebCryptoAPI/generateKey/test_failures_AES-CBC.html",0,null,null,[["Bad algorithm: generateKey(AES, false, [decrypt])",1,"assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\"","testError/ [0,145,"getWindowHandle",null] 03:22:06 INFO - PROCESS | 3752 | 1483615326283 Marionette TRACE conn4 <- [1,145,null,{"value":"12"}] 03:22:06 INFO - PROCESS | 3752 | 1483615326300 Marionette TRACE conn4 -> [0,146,"timeouts",{"script":185000}] 03:22:06 INFO - TEST-START | /WebCryptoAPI/generateKey/test_failures_AES-CTR.html 03:22:06 INFO - PROCESS | 3752 | 1483615326304 Marionette TRACE conn4 <- [1,146,null,{}] 03:22:06 INFO - PROCESS | 3752 | 1483615326308 Marionette TRACE conn4 -> [0,147,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:06 INFO - PROCESS | 3752 | 1483615326413 Marionette TRACE conn4 <- [1,147,null,{"value":null}] 03:22:06 INFO - PROCESS | 3752 | 1483615326418 Marionette TRACE conn4 -> [0,148,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/test_failures_AES-CTR.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/test_failures_AES-CTR.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:06 INFO - PROCESS | 3752 | ++DOCSHELL 13AE1000 == 10 [pid = 3752] [id = 45] 03:22:06 INFO - PROCESS | 3752 | ++DOMWINDOW == 23 (140C6800) [pid = 3752] [serial = 136] [outer = 00000000] 03:22:06 INFO - PROCESS | 3752 | ++DOMWINDOW == 24 (140EB800) [pid = 3752] [serial = 137] [outer = 140C6800] 03:22:06 INFO - PROCESS | 3752 | 1483615326473 Marionette DEBUG loaded listener.js 03:22:06 INFO - PROCESS | 3752 | ++DOMWINDOW == 25 (1441D400) [pid = 3752] [serial = 138] [outer = 140C6800] 03:22:10 INFO - PROCESS | 3752 | 1483615330369 Marionette TRACE conn4 <- [1,148,null,{"value":["/WebCryptoAPI/generateKey/test_failures_AES-CTR.html",0,null,null,[["Bad algorithm: generateKey(AES, false, [decrypt])",1,"assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\"","testError/ [0,149,"getWindowHandle",null] 03:22:10 INFO - PROCESS | 3752 | 1483615330890 Marionette TRACE conn4 <- [1,149,null,{"value":"12"}] 03:22:10 INFO - TEST-START | /WebCryptoAPI/generateKey/test_failures_AES-GCM.html 03:22:10 INFO - PROCESS | 3752 | 1483615330914 Marionette TRACE conn4 -> [0,150,"timeouts",{"script":185000}] 03:22:10 INFO - PROCESS | 3752 | 1483615330919 Marionette TRACE conn4 <- [1,150,null,{}] 03:22:10 INFO - PROCESS | 3752 | 1483615330927 Marionette TRACE conn4 -> [0,151,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:11 INFO - PROCESS | 3752 | 1483615331185 Marionette TRACE conn4 <- [1,151,null,{"value":null}] 03:22:11 INFO - PROCESS | 3752 | 1483615331240 Marionette TRACE conn4 -> [0,152,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/test_failures_AES-GCM.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/test_failures_AES-GCM.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:11 INFO - PROCESS | 3752 | ++DOCSHELL 0EC3D000 == 11 [pid = 3752] [id = 46] 03:22:11 INFO - PROCESS | 3752 | ++DOMWINDOW == 26 (0EC3DC00) [pid = 3752] [serial = 139] [outer = 00000000] 03:22:11 INFO - PROCESS | 3752 | ++DOMWINDOW == 27 (0F693800) [pid = 3752] [serial = 140] [outer = 0EC3DC00] 03:22:11 INFO - PROCESS | 3752 | 1483615331301 Marionette DEBUG loaded listener.js 03:22:11 INFO - PROCESS | 3752 | ++DOMWINDOW == 28 (0F9CAC00) [pid = 3752] [serial = 141] [outer = 0EC3DC00] 03:22:12 INFO - PROCESS | 3752 | --DOCSHELL 12898800 == 10 [pid = 3752] [id = 44] 03:22:12 INFO - PROCESS | 3752 | --DOCSHELL 112A0800 == 9 [pid = 3752] [id = 43] 03:22:12 INFO - PROCESS | 3752 | --DOCSHELL 0F9C9800 == 8 [pid = 3752] [id = 42] 03:22:12 INFO - PROCESS | 3752 | --DOCSHELL 0F9CB000 == 7 [pid = 3752] [id = 41] 03:22:14 INFO - PROCESS | 3752 | 1483615334514 Marionette TRACE conn4 <- [1,152,null,{"value":["/WebCryptoAPI/generateKey/test_failures_AES-GCM.html",0,null,null,[["Bad algorithm: generateKey(AES, false, [decrypt])",1,"assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\"","testError/ [0,153,"getWindowHandle",null] 03:22:14 INFO - PROCESS | 3752 | 1483615334954 Marionette TRACE conn4 <- [1,153,null,{"value":"12"}] 03:22:14 INFO - TEST-START | /WebCryptoAPI/generateKey/test_failures_AES-KW.html 03:22:14 INFO - PROCESS | 3752 | 1483615334968 Marionette TRACE conn4 -> [0,154,"timeouts",{"script":185000}] 03:22:14 INFO - PROCESS | 3752 | 1483615334955 Marionette TRACE conn4 <- [1,154,null,{}] 03:22:14 INFO - PROCESS | 3752 | 1483615334961 Marionette TRACE conn4 -> [0,155,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:15 INFO - PROCESS | 3752 | 1483615335098 Marionette TRACE conn4 <- [1,155,null,{"value":null}] 03:22:15 INFO - PROCESS | 3752 | 1483615335108 Marionette TRACE conn4 -> [0,156,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/test_failures_AES-KW.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/test_failures_AES-KW.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:15 INFO - PROCESS | 3752 | ++DOCSHELL 11E6A000 == 8 [pid = 3752] [id = 47] 03:22:15 INFO - PROCESS | 3752 | ++DOMWINDOW == 29 (12149400) [pid = 3752] [serial = 142] [outer = 00000000] 03:22:15 INFO - PROCESS | 3752 | ++DOMWINDOW == 30 (1288BC00) [pid = 3752] [serial = 143] [outer = 12149400] 03:22:15 INFO - PROCESS | 3752 | 1483615335174 Marionette DEBUG loaded listener.js 03:22:15 INFO - PROCESS | 3752 | ++DOMWINDOW == 31 (122D8800) [pid = 3752] [serial = 144] [outer = 12149400] 03:22:16 INFO - PROCESS | 3752 | --DOMWINDOW == 30 (0F9CB400) [pid = 3752] [serial = 124] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.worker] 03:22:16 INFO - PROCESS | 3752 | --DOMWINDOW == 29 (112A1C00) [pid = 3752] [serial = 130] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/test_aes-ctr.html] 03:22:16 INFO - PROCESS | 3752 | --DOMWINDOW == 28 (0F9C9C00) [pid = 3752] [serial = 127] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/test_aes-cbc.html] 03:22:16 INFO - PROCESS | 3752 | --DOMWINDOW == 27 (12B1DC00) [pid = 3752] [serial = 133] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/test_failures_AES-CBC.html] 03:22:17 INFO - PROCESS | 3752 | 1483615337713 Marionette TRACE conn4 <- [1,156,null,{"value":["/WebCryptoAPI/generateKey/test_failures_AES-KW.html",0,null,null,[["Bad algorithm: generateKey(AES, false, [decrypt])",1,"assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\"","testError/ [0,157,"getWindowHandle",null] 03:22:18 INFO - PROCESS | 3752 | 1483615338021 Marionette TRACE conn4 <- [1,157,null,{"value":"12"}] 03:22:18 INFO - TEST-START | /WebCryptoAPI/generateKey/test_failures_ECDH.html 03:22:18 INFO - PROCESS | 3752 | 1483615338032 Marionette TRACE conn4 -> [0,158,"timeouts",{"script":185000}] 03:22:18 INFO - PROCESS | 3752 | 1483615338037 Marionette TRACE conn4 <- [1,158,null,{}] 03:22:18 INFO - PROCESS | 3752 | 1483615338041 Marionette TRACE conn4 -> [0,159,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:18 INFO - PROCESS | 3752 | 1483615338164 Marionette TRACE conn4 <- [1,159,null,{"value":null}] 03:22:18 INFO - PROCESS | 3752 | 1483615338173 Marionette TRACE conn4 -> [0,160,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/test_failures_ECDH.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/test_failures_ECDH.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:18 INFO - PROCESS | 3752 | ++DOCSHELL 12B2C000 == 9 [pid = 3752] [id = 48] 03:22:18 INFO - PROCESS | 3752 | ++DOMWINDOW == 28 (12BFAC00) [pid = 3752] [serial = 145] [outer = 00000000] 03:22:18 INFO - PROCESS | 3752 | ++DOMWINDOW == 29 (13FEEC00) [pid = 3752] [serial = 146] [outer = 12BFAC00] 03:22:18 INFO - PROCESS | 3752 | 1483615338229 Marionette DEBUG loaded listener.js 03:22:18 INFO - PROCESS | 3752 | ++DOMWINDOW == 30 (13FEC800) [pid = 3752] [serial = 147] [outer = 12BFAC00] 03:22:21 INFO - PROCESS | 3752 | --DOCSHELL 11E6A000 == 8 [pid = 3752] [id = 47] 03:22:21 INFO - PROCESS | 3752 | --DOCSHELL 0EC3D000 == 7 [pid = 3752] [id = 46] 03:22:21 INFO - PROCESS | 3752 | --DOCSHELL 13AE1000 == 6 [pid = 3752] [id = 45] 03:22:21 INFO - PROCESS | 3752 | --DOMWINDOW == 29 (11CB6800) [pid = 3752] [serial = 132] [outer = 00000000] [url = about:blank] 03:22:21 INFO - PROCESS | 3752 | --DOMWINDOW == 28 (12BFB800) [pid = 3752] [serial = 135] [outer = 00000000] [url = about:blank] 03:22:21 INFO - PROCESS | 3752 | --DOMWINDOW == 27 (0FBB3000) [pid = 3752] [serial = 126] [outer = 00000000] [url = about:blank] 03:22:21 INFO - PROCESS | 3752 | --DOMWINDOW == 26 (11CAC800) [pid = 3752] [serial = 131] [outer = 00000000] [url = about:blank] 03:22:21 INFO - PROCESS | 3752 | --DOMWINDOW == 25 (0FBB1800) [pid = 3752] [serial = 129] [outer = 00000000] [url = about:blank] 03:22:21 INFO - PROCESS | 3752 | --DOMWINDOW == 24 (0FB0B800) [pid = 3752] [serial = 128] [outer = 00000000] [url = about:blank] 03:22:21 INFO - PROCESS | 3752 | --DOMWINDOW == 23 (12BFCC00) [pid = 3752] [serial = 134] [outer = 00000000] [url = about:blank] 03:22:21 INFO - PROCESS | 3752 | --DOMWINDOW == 22 (140EB800) [pid = 3752] [serial = 137] [outer = 00000000] [url = about:blank] 03:22:23 INFO - PROCESS | 3752 | 1483615342993 Marionette TRACE conn4 <- [1,160,null,{"value":["/WebCryptoAPI/generateKey/test_failures_ECDH.html",0,null,null,[["Bad algorithm: generateKey(AES, false, [decrypt])",1,"assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\"","testError/ [0,161,"getWindowHandle",null] 03:22:23 INFO - PROCESS | 3752 | 1483615343313 Marionette TRACE conn4 <- [1,161,null,{"value":"12"}] 03:22:23 INFO - TEST-START | /WebCryptoAPI/generateKey/test_failures_ECDSA.html 03:22:23 INFO - PROCESS | 3752 | 1483615343330 Marionette TRACE conn4 -> [0,162,"timeouts",{"script":185000}] 03:22:23 INFO - PROCESS | 3752 | 1483615343334 Marionette TRACE conn4 <- [1,162,null,{}] 03:22:23 INFO - PROCESS | 3752 | 1483615343341 Marionette TRACE conn4 -> [0,163,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:23 INFO - PROCESS | 3752 | 1483615343466 Marionette TRACE conn4 <- [1,163,null,{"value":null}] 03:22:23 INFO - PROCESS | 3752 | 1483615343473 Marionette TRACE conn4 -> [0,164,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/test_failures_ECDSA.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/test_failures_ECDSA.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:23 INFO - PROCESS | 3752 | ++DOCSHELL 10596C00 == 7 [pid = 3752] [id = 49] 03:22:23 INFO - PROCESS | 3752 | ++DOMWINDOW == 23 (105A2400) [pid = 3752] [serial = 148] [outer = 00000000] 03:22:23 INFO - PROCESS | 3752 | ++DOMWINDOW == 24 (111D3C00) [pid = 3752] [serial = 149] [outer = 105A2400] 03:22:23 INFO - PROCESS | 3752 | 1483615343532 Marionette DEBUG loaded listener.js 03:22:23 INFO - PROCESS | 3752 | ++DOMWINDOW == 25 (11104800) [pid = 3752] [serial = 150] [outer = 105A2400] 03:22:26 INFO - PROCESS | 3752 | --DOMWINDOW == 24 (140C6800) [pid = 3752] [serial = 136] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/test_failures_AES-CTR.html] 03:22:26 INFO - PROCESS | 3752 | --DOMWINDOW == 23 (0EC3DC00) [pid = 3752] [serial = 139] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/test_failures_AES-GCM.html] 03:22:26 INFO - PROCESS | 3752 | --DOMWINDOW == 22 (12149400) [pid = 3752] [serial = 142] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/test_failures_AES-KW.html] 03:22:27 INFO - PROCESS | 3752 | 1483615347185 Marionette TRACE conn4 <- [1,164,null,{"value":["/WebCryptoAPI/generateKey/test_failures_ECDSA.html",0,null,null,[["Bad algorithm: generateKey(AES, false, [decrypt])",1,"assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\"","testError/ [0,165,"getWindowHandle",null] 03:22:27 INFO - PROCESS | 3752 | 1483615347471 Marionette TRACE conn4 <- [1,165,null,{"value":"12"}] 03:22:27 INFO - TEST-START | /WebCryptoAPI/generateKey/test_failures_HMAC.html 03:22:27 INFO - PROCESS | 3752 | 1483615347487 Marionette TRACE conn4 -> [0,166,"timeouts",{"script":185000}] 03:22:27 INFO - PROCESS | 3752 | 1483615347491 Marionette TRACE conn4 <- [1,166,null,{}] 03:22:27 INFO - PROCESS | 3752 | 1483615347496 Marionette TRACE conn4 -> [0,167,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:27 INFO - PROCESS | 3752 | 1483615347611 Marionette TRACE conn4 <- [1,167,null,{"value":null}] 03:22:27 INFO - PROCESS | 3752 | 1483615347618 Marionette TRACE conn4 -> [0,168,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/test_failures_HMAC.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/test_failures_HMAC.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:27 INFO - PROCESS | 3752 | ++DOCSHELL 12891800 == 8 [pid = 3752] [id = 50] 03:22:27 INFO - PROCESS | 3752 | ++DOMWINDOW == 23 (12895400) [pid = 3752] [serial = 151] [outer = 00000000] 03:22:27 INFO - PROCESS | 3752 | ++DOMWINDOW == 24 (12DE4C00) [pid = 3752] [serial = 152] [outer = 12895400] 03:22:27 INFO - PROCESS | 3752 | 1483615347674 Marionette DEBUG loaded listener.js 03:22:27 INFO - PROCESS | 3752 | ++DOMWINDOW == 25 (12DE6400) [pid = 3752] [serial = 153] [outer = 12895400] 03:22:30 INFO - PROCESS | 3752 | 1483615350390 Marionette TRACE conn4 <- [1,168,null,{"value":["/WebCryptoAPI/generateKey/test_failures_HMAC.html",0,null,null,[["Bad algorithm: generateKey(AES, false, [decrypt])",1,"assert_equals: Bad algorithm not supported expected \"NotSupportedError\" but got \"SyntaxError\"","testError/ [0,169,"getWindowHandle",null] 03:22:30 INFO - PROCESS | 3752 | 1483615350719 Marionette TRACE conn4 <- [1,169,null,{"value":"12"}] 03:22:30 INFO - TEST-START | /WebCryptoAPI/generateKey/test_successes_AES-CTR.html 03:22:30 INFO - PROCESS | 3752 | 1483615350726 Marionette TRACE conn4 -> [0,170,"timeouts",{"script":185000}] 03:22:30 INFO - PROCESS | 3752 | 1483615350731 Marionette TRACE conn4 <- [1,170,null,{}] 03:22:30 INFO - PROCESS | 3752 | 1483615350739 Marionette TRACE conn4 -> [0,171,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:30 INFO - PROCESS | 3752 | 1483615350900 Marionette TRACE conn4 <- [1,171,null,{"value":null}] 03:22:30 INFO - PROCESS | 3752 | 1483615350961 Marionette TRACE conn4 -> [0,172,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/test_successes_AES-CTR.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/test_successes_AES-CTR.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:30 INFO - PROCESS | 3752 | ++DOCSHELL 1189EC00 == 9 [pid = 3752] [id = 51] 03:22:30 INFO - PROCESS | 3752 | ++DOMWINDOW == 26 (11CA8C00) [pid = 3752] [serial = 154] [outer = 00000000] 03:22:31 INFO - PROCESS | 3752 | ++DOMWINDOW == 27 (11E29400) [pid = 3752] [serial = 155] [outer = 11CA8C00] 03:22:31 INFO - PROCESS | 3752 | 1483615351029 Marionette DEBUG loaded listener.js 03:22:31 INFO - PROCESS | 3752 | ++DOMWINDOW == 28 (11CB4400) [pid = 3752] [serial = 156] [outer = 11CA8C00] 03:22:32 INFO - PROCESS | 3752 | 1483615352488 Marionette TRACE conn4 <- [1,172,null,{"value":["/WebCryptoAPI/generateKey/test_successes_AES-CTR.html",0,null,null,[["Success: generateKey({length: 128, name: AES-CTR}, false, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-ctr}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null]]]}] 03:22:32 INFO - ................................................................................................................................................................................................................................................................................................ 03:22:32 INFO - TEST-OK | /WebCryptoAPI/generateKey/test_successes_AES-CTR.html | took 1933ms 03:22:32 INFO - PROCESS | 3752 | 1483615352671 Marionette TRACE conn4 -> [0,173,"getWindowHandle",null] 03:22:32 INFO - PROCESS | 3752 | 1483615352679 Marionette TRACE conn4 <- [1,173,null,{"value":"12"}] 03:22:32 INFO - TEST-START | /WebCryptoAPI/generateKey/test_successes_AES-GCM.html 03:22:32 INFO - PROCESS | 3752 | --DOMWINDOW == 27 (13FEEC00) [pid = 3752] [serial = 146] [outer = 00000000] [url = about:blank] 03:22:32 INFO - PROCESS | 3752 | --DOMWINDOW == 26 (1441D400) [pid = 3752] [serial = 138] [outer = 00000000] [url = about:blank] 03:22:32 INFO - PROCESS | 3752 | --DOMWINDOW == 25 (0F9CAC00) [pid = 3752] [serial = 141] [outer = 00000000] [url = about:blank] 03:22:32 INFO - PROCESS | 3752 | --DOMWINDOW == 24 (122D8800) [pid = 3752] [serial = 144] [outer = 00000000] [url = about:blank] 03:22:32 INFO - PROCESS | 3752 | --DOMWINDOW == 23 (1288BC00) [pid = 3752] [serial = 143] [outer = 00000000] [url = about:blank] 03:22:32 INFO - PROCESS | 3752 | --DOMWINDOW == 22 (0F693800) [pid = 3752] [serial = 140] [outer = 00000000] [url = about:blank] 03:22:32 INFO - PROCESS | 3752 | 1483615352694 Marionette TRACE conn4 -> [0,174,"timeouts",{"script":185000}] 03:22:32 INFO - PROCESS | 3752 | 1483615352698 Marionette TRACE conn4 <- [1,174,null,{}] 03:22:32 INFO - PROCESS | 3752 | 1483615352706 Marionette TRACE conn4 -> [0,175,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:32 INFO - PROCESS | 3752 | 1483615352822 Marionette TRACE conn4 <- [1,175,null,{"value":null}] 03:22:32 INFO - PROCESS | 3752 | 1483615352879 Marionette TRACE conn4 -> [0,176,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/test_successes_AES-GCM.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/test_successes_AES-GCM.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:32 INFO - PROCESS | 3752 | ++DOCSHELL 0FB08000 == 10 [pid = 3752] [id = 52] 03:22:32 INFO - PROCESS | 3752 | ++DOMWINDOW == 23 (0FB08400) [pid = 3752] [serial = 157] [outer = 00000000] 03:22:32 INFO - PROCESS | 3752 | ++DOMWINDOW == 24 (0FBB8000) [pid = 3752] [serial = 158] [outer = 0FB08400] 03:22:32 INFO - PROCESS | 3752 | 1483615352942 Marionette DEBUG loaded listener.js 03:22:33 INFO - PROCESS | 3752 | ++DOMWINDOW == 25 (0FBB2800) [pid = 3752] [serial = 159] [outer = 0FB08400] 03:22:34 INFO - PROCESS | 3752 | 1483615354020 Marionette TRACE conn4 <- [1,176,null,{"value":["/WebCryptoAPI/generateKey/test_successes_AES-GCM.html",0,null,null,[["Success: generateKey({length: 128, name: AES-GCM}, false, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, true, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, false, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, true, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, false, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, true, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, false, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, true, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, false, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, true, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, false, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, true, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, false, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, true, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, false, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, true, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, false, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, true, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, false, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, true, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, false, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, true, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, false, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, true, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, false, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, true, [encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, false, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, true, [decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, false, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, true, [encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, false, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, true, [decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, false, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, true, [encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, false, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, true, [decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, false, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, true, [wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, decrypt, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, false, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, true, [wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, wrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, encrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, false, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, true, [decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, false, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, true, [wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, wrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, decrypt])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-gcm}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey])",0,null,null]]]}] 03:22:34 INFO - ................................................................................................................................................................................................................................................................................................ 03:22:34 INFO - TEST-OK | /WebCryptoAPI/generateKey/test_successes_AES-GCM.html | took 1558ms 03:22:34 INFO - PROCESS | 3752 | 1483615354229 Marionette TRACE conn4 -> [0,177,"getWindowHandle",null] 03:22:34 INFO - PROCESS | 3752 | 1483615354235 Marionette TRACE conn4 <- [1,177,null,{"value":"12"}] 03:22:34 INFO - PROCESS | 3752 | 1483615354243 Marionette TRACE conn4 -> [0,178,"timeouts",{"script":185000}] 03:22:34 INFO - TEST-START | /WebCryptoAPI/generateKey/test_successes_AES-KW.html 03:22:34 INFO - PROCESS | 3752 | 1483615354247 Marionette TRACE conn4 <- [1,178,null,{}] 03:22:34 INFO - PROCESS | 3752 | 1483615354251 Marionette TRACE conn4 -> [0,179,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:34 INFO - PROCESS | 3752 | 1483615354351 Marionette TRACE conn4 <- [1,179,null,{"value":null}] 03:22:34 INFO - PROCESS | 3752 | 1483615354359 Marionette TRACE conn4 -> [0,180,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/test_successes_AES-KW.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/test_successes_AES-KW.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:34 INFO - PROCESS | 3752 | ++DOCSHELL 12B24800 == 11 [pid = 3752] [id = 53] 03:22:34 INFO - PROCESS | 3752 | ++DOMWINDOW == 26 (12B2B400) [pid = 3752] [serial = 160] [outer = 00000000] 03:22:34 INFO - PROCESS | 3752 | ++DOMWINDOW == 27 (13D7AC00) [pid = 3752] [serial = 161] [outer = 12B2B400] 03:22:34 INFO - PROCESS | 3752 | 1483615354416 Marionette DEBUG loaded listener.js 03:22:34 INFO - PROCESS | 3752 | ++DOMWINDOW == 28 (13FE6C00) [pid = 3752] [serial = 162] [outer = 12B2B400] 03:22:35 INFO - PROCESS | 3752 | 1483615355088 Marionette TRACE conn4 <- [1,180,null,{"value":["/WebCryptoAPI/generateKey/test_successes_AES-KW.html",0,null,null,[["Success: generateKey({length: 128, name: AES-KW}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-KW}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-KW}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-KW}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-KW}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-KW}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-KW}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-KW}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-KW}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-KW}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-kw}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-kw}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-kw}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-kw}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-kw}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-kw}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-kw}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-kw}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-kw}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-kw}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-kw}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-kw}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-kw}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-kw}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-kw}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-kw}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-kw}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-kw}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 128, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-kw}, false, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-kw}, true, [wrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-kw}, false, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-kw}, true, [unwrapKey, wrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-kw}, false, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-kw}, true, [unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])",0,null,null],["Success: generateKey({length: 256, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])",0,null,null]]]}] 03:22:35 INFO - PROCESS | 3752 | --DOMWINDOW == 27 (105A2400) [pid = 3752] [serial = 148] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/test_failures_ECDSA.html] 03:22:35 INFO - ........................................................................ 03:22:35 INFO - TEST-OK | /WebCryptoAPI/generateKey/test_successes_AES-KW.html | took 982ms 03:22:35 INFO - PROCESS | 3752 | 1483615355225 Marionette TRACE conn4 -> [0,181,"getWindowHandle",null] 03:22:35 INFO - PROCESS | 3752 | 1483615355228 Marionette TRACE conn4 <- [1,181,null,{"value":"12"}] 03:22:35 INFO - TEST-START | /WebCryptoAPI/generateKey/test_successes_ECDH.html 03:22:35 INFO - PROCESS | 3752 | 1483615355232 Marionette TRACE conn4 -> [0,182,"timeouts",{"script":185000}] 03:22:35 INFO - PROCESS | 3752 | 1483615355237 Marionette TRACE conn4 <- [1,182,null,{}] 03:22:35 INFO - PROCESS | 3752 | 1483615355249 Marionette TRACE conn4 -> [0,183,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:35 INFO - PROCESS | 3752 | 1483615355361 Marionette TRACE conn4 <- [1,183,null,{"value":null}] 03:22:35 INFO - PROCESS | 3752 | 1483615355371 Marionette TRACE conn4 -> [0,184,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/test_successes_ECDH.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/test_successes_ECDH.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:35 INFO - PROCESS | 3752 | ++DOCSHELL 14B61000 == 12 [pid = 3752] [id = 54] 03:22:35 INFO - PROCESS | 3752 | ++DOMWINDOW == 28 (14B61800) [pid = 3752] [serial = 163] [outer = 00000000] 03:22:35 INFO - PROCESS | 3752 | ++DOMWINDOW == 29 (14B69800) [pid = 3752] [serial = 164] [outer = 14B61800] 03:22:35 INFO - PROCESS | 3752 | 1483615355460 Marionette DEBUG loaded listener.js 03:22:35 INFO - PROCESS | 3752 | ++DOMWINDOW == 30 (14BBBC00) [pid = 3752] [serial = 165] [outer = 14B61800] 03:22:38 INFO - PROCESS | 3752 | 1483615358162 Marionette TRACE conn4 <- [1,184,null,{"value":["/WebCryptoAPI/generateKey/test_successes_ECDH.html",0,null,null,[["Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",0,null,null],["Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",0,null,null],["Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",0,null,null],["Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits])",0,null,null]]]}] 03:22:38 INFO - ........................................................................ 03:22:38 INFO - TEST-OK | /WebCryptoAPI/generateKey/test_successes_ECDH.html | took 3038ms 03:22:38 INFO - PROCESS | 3752 | 1483615358272 Marionette TRACE conn4 -> [0,185,"getWindowHandle",null] 03:22:38 INFO - TEST-START | /WebCryptoAPI/generateKey/test_successes_ECDSA.html 03:22:38 INFO - PROCESS | 3752 | 1483615358275 Marionette TRACE conn4 <- [1,185,null,{"value":"12"}] 03:22:38 INFO - PROCESS | 3752 | 1483615358278 Marionette TRACE conn4 -> [0,186,"timeouts",{"script":185000}] 03:22:38 INFO - PROCESS | 3752 | 1483615358281 Marionette TRACE conn4 <- [1,186,null,{}] 03:22:38 INFO - PROCESS | 3752 | 1483615358285 Marionette TRACE conn4 -> [0,187,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:38 INFO - PROCESS | 3752 | 1483615358376 Marionette TRACE conn4 <- [1,187,null,{"value":null}] 03:22:38 INFO - PROCESS | 3752 | 1483615358382 Marionette TRACE conn4 -> [0,188,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/test_successes_ECDSA.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/test_successes_ECDSA.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:38 INFO - PROCESS | 3752 | ++DOCSHELL 16837800 == 13 [pid = 3752] [id = 55] 03:22:38 INFO - PROCESS | 3752 | ++DOMWINDOW == 31 (16837C00) [pid = 3752] [serial = 166] [outer = 00000000] 03:22:38 INFO - PROCESS | 3752 | ++DOMWINDOW == 32 (1698A400) [pid = 3752] [serial = 167] [outer = 16837C00] 03:22:38 INFO - PROCESS | 3752 | 1483615358436 Marionette DEBUG loaded listener.js 03:22:38 INFO - PROCESS | 3752 | ++DOMWINDOW == 33 (16986400) [pid = 3752] [serial = 168] [outer = 16837C00] 03:22:40 INFO - PROCESS | 3752 | --DOCSHELL 10596C00 == 12 [pid = 3752] [id = 49] 03:22:40 INFO - PROCESS | 3752 | --DOCSHELL 12891800 == 11 [pid = 3752] [id = 50] 03:22:40 INFO - PROCESS | 3752 | --DOCSHELL 1189EC00 == 10 [pid = 3752] [id = 51] 03:22:40 INFO - PROCESS | 3752 | --DOMWINDOW == 32 (111D3C00) [pid = 3752] [serial = 149] [outer = 00000000] [url = about:blank] 03:22:40 INFO - PROCESS | 3752 | --DOMWINDOW == 31 (12DE4C00) [pid = 3752] [serial = 152] [outer = 00000000] [url = about:blank] 03:22:40 INFO - PROCESS | 3752 | --DOMWINDOW == 30 (11104800) [pid = 3752] [serial = 150] [outer = 00000000] [url = about:blank] 03:22:40 INFO - PROCESS | 3752 | 1483615360847 Marionette TRACE conn4 <- [1,188,null,{"value":["/WebCryptoAPI/generateKey/test_successes_ECDSA.html",0,null,null,[["Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign])",0,null,null],["Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign])",0,null,null],["Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [verify, sign])",0,null,null],["Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign])",0,null,null],["Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign, verify, sign, sign, verify])",0,null,null],["Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify])",0,null,null],["Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign])",0,null,null],["Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign])",0,null,null],["Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [verify, sign])",0,null,null],["Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign])",0,null,null],["Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign, verify, sign, sign, verify])",0,null,null],["Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify])",0,null,null],["Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign])",0,null,null],["Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign])",0,null,null],["Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [verify, sign])",0,null,null],["Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign])",0,null,null],["Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])",0,null,null],["Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])",0,null,null],["Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign])",0,null,null],["Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign])",0,null,null],["Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [verify, sign])",0,null,null],["Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [verify, sign])",0,null,null],["Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify])",0,null,null],["Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify])",0,null,null],["Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign])",0,null,null],["Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign])",0,null,null],["Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [verify, sign])",0,null,null],["Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [verify, sign])",0,null,null],["Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify])",0,null,null],["Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify])",0,null,null],["Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign])",0,null,null],["Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign])",0,null,null],["Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [verify, sign])",0,null,null],["Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [verify, sign])",0,null,null],["Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])",0,null,null],["Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])",0,null,null],["Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign])",0,null,null],["Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign])",0,null,null],["Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [verify, sign])",0,null,null],["Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [verify, sign])",0,null,null],["Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify])",0,null,null],["Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify])",0,null,null],["Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign])",0,null,null],["Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign])",0,null,null],["Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [verify, sign])",0,null,null],["Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [verify, sign])",0,null,null],["Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify])",0,null,null],["Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify])",0,null,null],["Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign])",0,null,null],["Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign])",0,null,null],["Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [verify, sign])",0,null,null],["Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [verify, sign])",0,null,null],["Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify])",0,null,null],["Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify])",0,null,null]]]}] 03:22:40 INFO - ...................................................... 03:22:40 INFO - TEST-OK | /WebCryptoAPI/generateKey/test_successes_ECDSA.html | took 2618ms 03:22:40 INFO - PROCESS | 3752 | 1483615360893 Marionette TRACE conn4 -> [0,189,"getWindowHandle",null] 03:22:40 INFO - TEST-START | /WebCryptoAPI/generateKey/test_successes_HMAC.html 03:22:40 INFO - PROCESS | 3752 | 1483615360899 Marionette TRACE conn4 <- [1,189,null,{"value":"12"}] 03:22:40 INFO - PROCESS | 3752 | 1483615360906 Marionette TRACE conn4 -> [0,190,"timeouts",{"script":185000}] 03:22:40 INFO - PROCESS | 3752 | 1483615360910 Marionette TRACE conn4 <- [1,190,null,{}] 03:22:40 INFO - PROCESS | 3752 | 1483615360917 Marionette TRACE conn4 -> [0,191,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:41 INFO - PROCESS | 3752 | 1483615361021 Marionette TRACE conn4 <- [1,191,null,{"value":null}] 03:22:41 INFO - PROCESS | 3752 | 1483615361028 Marionette TRACE conn4 -> [0,192,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/generateKey/test_successes_HMAC.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/generateKey/test_successes_HMAC.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:41 INFO - PROCESS | 3752 | ++DOCSHELL 0FE45400 == 11 [pid = 3752] [id = 56] 03:22:41 INFO - PROCESS | 3752 | ++DOMWINDOW == 31 (0FE46800) [pid = 3752] [serial = 169] [outer = 00000000] 03:22:41 INFO - PROCESS | 3752 | ++DOMWINDOW == 32 (1110AC00) [pid = 3752] [serial = 170] [outer = 0FE46800] 03:22:41 INFO - PROCESS | 3752 | 1483615361091 Marionette DEBUG loaded listener.js 03:22:41 INFO - PROCESS | 3752 | ++DOMWINDOW == 33 (111D3C00) [pid = 3752] [serial = 171] [outer = 0FE46800] 03:22:41 INFO - PROCESS | 3752 | 1483615361770 Marionette TRACE conn4 <- [1,192,null,{"value":["/WebCryptoAPI/generateKey/test_successes_HMAC.html",0,null,null,[["Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [sign])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [verify])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [sign])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [verify])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [sign])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [verify])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [sign])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [verify])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [sign])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [sign])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [verify])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [verify])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [sign])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [sign])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [verify])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [verify])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [sign])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [sign])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [verify])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [verify])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [sign])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [sign])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [verify])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [verify])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [sign])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [sign])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [verify])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [verify])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [sign])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [sign])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [verify])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [verify])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [sign])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [sign])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [verify])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [verify])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [sign])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [sign])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [verify, sign])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [verify])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [verify])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [sign, verify, sign, verify])",0,null,null],["Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [sign, verify, sign, verify])",0,null,null]]]}] 03:22:41 INFO - ................................................................................................ 03:22:41 INFO - TEST-OK | /WebCryptoAPI/generateKey/test_successes_HMAC.html | took 1013ms 03:22:41 INFO - PROCESS | 3752 | 1483615361912 Marionette TRACE conn4 -> [0,193,"getWindowHandle",null] 03:22:41 INFO - PROCESS | 3752 | 1483615361925 Marionette TRACE conn4 <- [1,193,null,{"value":"12"}] 03:22:41 INFO - TEST-START | /WebCryptoAPI/getRandomValues.worker 03:22:41 INFO - PROCESS | 3752 | 1483615361934 Marionette TRACE conn4 -> [0,194,"timeouts",{"script":35000}] 03:22:41 INFO - PROCESS | 3752 | 1483615361938 Marionette TRACE conn4 <- [1,194,null,{}] 03:22:41 INFO - PROCESS | 3752 | 1483615361942 Marionette TRACE conn4 -> [0,195,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:42 INFO - PROCESS | 3752 | 1483615362065 Marionette TRACE conn4 <- [1,195,null,{"value":null}] 03:22:42 INFO - PROCESS | 3752 | 1483615362074 Marionette TRACE conn4 -> [0,196,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/getRandomValues.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/getRandomValues.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:42 INFO - PROCESS | 3752 | ++DOCSHELL 1288CC00 == 12 [pid = 3752] [id = 57] 03:22:42 INFO - PROCESS | 3752 | ++DOMWINDOW == 34 (12BF3800) [pid = 3752] [serial = 172] [outer = 00000000] 03:22:42 INFO - PROCESS | 3752 | ++DOMWINDOW == 35 (12DE0400) [pid = 3752] [serial = 173] [outer = 12BF3800] 03:22:42 INFO - PROCESS | 3752 | 1483615362131 Marionette DEBUG loaded listener.js 03:22:42 INFO - PROCESS | 3752 | ++DOMWINDOW == 36 (12DE9C00) [pid = 3752] [serial = 174] [outer = 12BF3800] 03:22:42 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:22:42 INFO - PROCESS | 3752 | [3752] WARNING: ArrayBufferView length is 0, cannot continue: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/base/Crypto.cpp, line 88 03:22:42 INFO - PROCESS | 3752 | [3752] WARNING: ArrayBufferView length is 0, cannot continue: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/base/Crypto.cpp, line 88 03:22:42 INFO - PROCESS | 3752 | [3752] WARNING: ArrayBufferView length is 0, cannot continue: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/base/Crypto.cpp, line 88 03:22:42 INFO - PROCESS | 3752 | [3752] WARNING: ArrayBufferView length is 0, cannot continue: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/base/Crypto.cpp, line 88 03:22:42 INFO - PROCESS | 3752 | [3752] WARNING: ArrayBufferView length is 0, cannot continue: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/base/Crypto.cpp, line 88 03:22:42 INFO - PROCESS | 3752 | [3752] WARNING: ArrayBufferView length is 0, cannot continue: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/base/Crypto.cpp, line 88 03:22:42 INFO - PROCESS | 3752 | [3752] WARNING: ArrayBufferView length is 0, cannot continue: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/base/Crypto.cpp, line 88 03:22:42 INFO - PROCESS | 3752 | 1483615362575 Marionette TRACE conn4 <- [1,196,null,{"value":["/WebCryptoAPI/getRandomValues.worker",0,null,null,[["Float arrays",0,{},{}],["Integer array",0,{},{}],["Large length",0,{},{}],["Null arrays",0,{},{}]]]}] 03:22:42 INFO - .... 03:22:42 INFO - TEST-OK | /WebCryptoAPI/getRandomValues.worker | took 701ms 03:22:42 INFO - PROCESS | 3752 | 1483615362634 Marionette TRACE conn4 -> [0,197,"getWindowHandle",null] 03:22:42 INFO - PROCESS | 3752 | 1483615362638 Marionette TRACE conn4 <- [1,197,null,{"value":"12"}] 03:22:42 INFO - PROCESS | 3752 | 1483615362642 Marionette TRACE conn4 -> [0,198,"timeouts",{"script":35000}] 03:22:42 INFO - TEST-START | /WebCryptoAPI/idlharness.html 03:22:42 INFO - PROCESS | 3752 | 1483615362647 Marionette TRACE conn4 <- [1,198,null,{}] 03:22:42 INFO - PROCESS | 3752 | 1483615362666 Marionette TRACE conn4 -> [0,199,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:42 INFO - PROCESS | 3752 | 1483615362791 Marionette TRACE conn4 <- [1,199,null,{"value":null}] 03:22:42 INFO - PROCESS | 3752 | 1483615362810 Marionette TRACE conn4 -> [0,200,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/idlharness.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/idlharness.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:42 INFO - PROCESS | 3752 | ++DOCSHELL 1441F400 == 13 [pid = 3752] [id = 58] 03:22:42 INFO - PROCESS | 3752 | ++DOMWINDOW == 37 (1441FC00) [pid = 3752] [serial = 175] [outer = 00000000] 03:22:42 INFO - PROCESS | 3752 | ++DOMWINDOW == 38 (14B67000) [pid = 3752] [serial = 176] [outer = 1441FC00] 03:22:42 INFO - PROCESS | 3752 | 1483615362867 Marionette DEBUG loaded listener.js 03:22:42 INFO - PROCESS | 3752 | ++DOMWINDOW == 39 (1441D400) [pid = 3752] [serial = 177] [outer = 1441FC00] 03:22:43 INFO - PROCESS | 3752 | 1483615363813 Marionette TRACE conn4 <- [1,200,null,{"value":["/WebCryptoAPI/idlharness.html",0,null,null,[["Crypto interface: existence and properties of interface object",0,null,null],["Crypto interface object length",0,null,null],["Crypto interface object name",0,null,null],["Crypto interface: existence and properties of interface prototype object",0,null,null],["Crypto interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["Crypto interface: attribute subtle",0,null,null],["Crypto interface: operation getRandomValues(ArrayBufferView)",0,null,null],["Crypto must be primary interface of crypto",0,null,null],["Stringification of crypto",0,null,null],["Crypto interface: crypto must inherit property \"subtle\" with the proper type (0)",0,null,null],["Crypto interface: crypto must inherit property \"getRandomValues\" with the proper type (1)",0,null,null],["Crypto interface: calling getRandomValues(ArrayBufferView) on crypto with too few arguments must throw TypeError",0,null,null],["CryptoKey interface: existence and properties of interface object",0,null,null],["CryptoKey interface object length",0,null,null],["CryptoKey interface object name",0,null,null],["CryptoKey interface: existence and properties of interface prototype object",0,null,null],["CryptoKey interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["CryptoKey interface: attribute type",0,null,null],["CryptoKey interface: attribute extractable",0,null,null],["CryptoKey interface: attribute algorithm",0,null,null],["CryptoKey interface: attribute usages",0,null,null],["SubtleCrypto interface: existence and properties of interface object",0,null,null],["SubtleCrypto interface object length",0,null,null],["SubtleCrypto interface object name",0,null,null],["SubtleCrypto interface: existence and properties of interface prototype object",0,null,null],["SubtleCrypto interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["SubtleCrypto interface: operation encrypt(AlgorithmIdentifier,CryptoKey,BufferSource)",0,null,null],["SubtleCrypto interface: operation decrypt(AlgorithmIdentifier,CryptoKey,BufferSource)",0,null,null],["SubtleCrypto interface: operation sign(AlgorithmIdentifier,CryptoKey,BufferSource)",0,null,null],["SubtleCrypto interface: operation verify(AlgorithmIdentifier,CryptoKey,BufferSource,BufferSource)",0,null,null],["SubtleCrypto interface: operation digest(AlgorithmIdentifier,BufferSource)",0,null,null],["SubtleCrypto interface: operation generateKey(AlgorithmIdentifier,boolean,[object Object])",0,null,null],["SubtleCrypto interface: operation deriveKey(AlgorithmIdentifier,CryptoKey,AlgorithmIdentifier,boolean,[object Object])",0,null,null],["SubtleCrypto interface: operation deriveBits(AlgorithmIdentifier,CryptoKey,unsigned long)",0,null,null],["SubtleCrypto interface: operation importKey(KeyFormat,[object Object],[object Object],AlgorithmIdentifier,boolean,[object Object])",0,null,null],["SubtleCrypto interface: operation exportKey(KeyFormat,CryptoKey)",0,null,null],["SubtleCrypto interface: operation wrapKey(KeyFormat,CryptoKey,CryptoKey,AlgorithmIdentifier)",0,null,null],["SubtleCrypto interface: operation unwrapKey(KeyFormat,BufferSource,CryptoKey,AlgorithmIdentifier,AlgorithmIdentifier,boolean,[object Object])",0,null,null],["SubtleCrypto must be primary interface of crypto.subtle",0,null,null],["Stringification of crypto.subtle",0,null,null],["SubtleCrypto interface: crypto.subtle must inherit property \"encrypt\" with the proper type (0)",0,null,null],["SubtleCrypto interface: calling encrypt(AlgorithmIdentifier,CryptoKey,BufferSource) on crypto.subtle with too few arguments must throw TypeError",0,null,null],["SubtleCrypto interface: crypto.subtle must inherit property \"decrypt\" with the proper type (1)",0,null,null],["SubtleCrypto interface: calling decrypt(AlgorithmIdentifier,CryptoKey,BufferSource) on crypto.subtle with too few arguments must throw TypeError",0,null,null],["SubtleCrypto interface: crypto.subtle must inherit property \"sign\" with the proper type (2)",0,null,null],["SubtleCrypto interface: calling sign(AlgorithmIdentifier,CryptoKey,BufferSource) on crypto.subtle with too few arguments must throw TypeError",0,null,null],["SubtleCrypto interface: crypto.subtle must inherit property \"verify\" with the proper type (3)",0,null,null],["SubtleCrypto interface: calling verify(AlgorithmIdentifier,CryptoKey,BufferSource,BufferSource) on crypto.subtle with too few arguments must throw TypeError",0,null,null],["SubtleCrypto interface: crypto.subtle must inherit property \"digest\" with the proper type (4)",0,null,null],["SubtleCrypto interface: calling digest(AlgorithmIdentifier,BufferSource) on crypto.subtle with too few arguments must throw TypeError",0,null,null],["SubtleCrypto interface: crypto.subtle must inherit property \"generateKey\" with the proper type (5)",0,null,null],["SubtleCrypto interface: calling generateKey(AlgorithmIdentifier,boolean,[object Object]) on crypto.subtle with too few arguments must throw TypeError",0,null,null],["SubtleCrypto interface: crypto.subtle must inherit property \"deriveKey\" with the proper type (6)",0,null,null],["SubtleCrypto interface: calling deriveKey(AlgorithmIdentifier,CryptoKey,AlgorithmIdentifier,boolean,[object Object]) on crypto.subtle with too few arguments must throw TypeError",0,null,null],["SubtleCrypto interface: crypto.subtle must inherit property \"deriveBits\" with the proper type (7)",0,null,null],["SubtleCrypto interface: calling deriveBits(AlgorithmIdentifier,CryptoKey,unsigned long) on crypto.subtle with too few arguments must throw TypeError",0,null,null],["SubtleCrypto interface: crypto.subtle must inherit property \"importKey\" with the proper type (8)",0,null,null],["SubtleCrypto interface: calling importKey(KeyFormat,[object Object],[object Object],AlgorithmIdentifier,boolean,[object Object]) on crypto.subtle with too few arguments must throw TypeError",0,null,null],["SubtleCrypto interface: crypto.subtle must inherit property \"exportKey\" with the proper type (9)",0,null,null],["SubtleCrypto interface: calling exportKey(KeyFormat,CryptoKey) on crypto.subtle with too few arguments must throw TypeError",0,null,null],["SubtleCrypto interface: crypto.subtle must inherit property \"wrapKey\" with the proper type (10)",0,null,null],["SubtleCrypto interface: calling wrapKey(KeyFormat,CryptoKey,CryptoKey,AlgorithmIdentifier) on crypto.subtle with too few arguments must throw TypeError",0,null,null],["SubtleCrypto interface: crypto.subtle must inherit property \"unwrapKey\" with the proper type (11)",0,null,null],["SubtleCrypto interface: calling unwrapKey(KeyFormat,BufferSource,CryptoKey,AlgorithmIdentifier,AlgorithmIdentifier,boolean,[object Object]) on crypto.subtle with too few arguments must throw TypeError",0,null,null]]]}] 03:22:43 INFO - ................................................................ 03:22:43 INFO - TEST-OK | /WebCryptoAPI/idlharness.html | took 1247ms 03:22:43 INFO - PROCESS | 3752 | 1483615363901 Marionette TRACE conn4 -> [0,201,"getWindowHandle",null] 03:22:43 INFO - PROCESS | 3752 | 1483615363904 Marionette TRACE conn4 <- [1,201,null,{"value":"12"}] 03:22:43 INFO - PROCESS | 3752 | 1483615363909 Marionette TRACE conn4 -> [0,202,"timeouts",{"script":35000}] 03:22:43 INFO - TEST-START | /WebCryptoAPI/idlharness.worker 03:22:43 INFO - PROCESS | 3752 | 1483615363912 Marionette TRACE conn4 <- [1,202,null,{}] 03:22:43 INFO - PROCESS | 3752 | 1483615363915 Marionette TRACE conn4 -> [0,203,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:44 INFO - PROCESS | 3752 | 1483615364058 Marionette TRACE conn4 <- [1,203,null,{"value":null}] 03:22:44 INFO - PROCESS | 3752 | 1483615364077 Marionette TRACE conn4 -> [0,204,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/idlharness.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/idlharness.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:44 INFO - PROCESS | 3752 | ++DOCSHELL 16D10000 == 14 [pid = 3752] [id = 59] 03:22:44 INFO - PROCESS | 3752 | ++DOMWINDOW == 40 (16FA5000) [pid = 3752] [serial = 178] [outer = 00000000] 03:22:44 INFO - PROCESS | 3752 | ++DOMWINDOW == 41 (17A6EC00) [pid = 3752] [serial = 179] [outer = 16FA5000] 03:22:44 INFO - PROCESS | 3752 | 1483615364133 Marionette DEBUG loaded listener.js 03:22:44 INFO - PROCESS | 3752 | ++DOMWINDOW == 42 (17A6BC00) [pid = 3752] [serial = 180] [outer = 16FA5000] 03:22:44 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:22:44 INFO - PROCESS | 3752 | --DOMWINDOW == 41 (12BFAC00) [pid = 3752] [serial = 145] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/test_failures_ECDH.html] 03:22:44 INFO - PROCESS | 3752 | --DOMWINDOW == 40 (0FB08400) [pid = 3752] [serial = 157] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/test_successes_AES-GCM.html] 03:22:44 INFO - PROCESS | 3752 | --DOMWINDOW == 39 (11CA8C00) [pid = 3752] [serial = 154] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/test_successes_AES-CTR.html] 03:22:44 INFO - PROCESS | 3752 | --DOMWINDOW == 38 (14B61800) [pid = 3752] [serial = 163] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/test_successes_ECDH.html] 03:22:44 INFO - PROCESS | 3752 | --DOMWINDOW == 37 (12895400) [pid = 3752] [serial = 151] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/test_failures_HMAC.html] 03:22:44 INFO - PROCESS | 3752 | --DOMWINDOW == 36 (12B2B400) [pid = 3752] [serial = 160] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/test_successes_AES-KW.html] 03:22:45 INFO - PROCESS | 3752 | 1483615365191 Marionette TRACE conn4 <- [1,204,null,{"value":["/WebCryptoAPI/idlharness.worker",0,null,null,[["Window interface: existence and properties of interface object",0,{},{}],["ArrayBuffer interface: existence and properties of interface object",1,"assert_false: expected false got true","IdlInterface.prototype.test/<@http://web-platform.test:8000/resources/idlharness.js:722:13\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nIdlInterface.prototype.test@http://web-platform.test:8000/resources/idlharness.js:721:9\nIdlArray.prototype.test@http://web-platform.test:8000/resources/idlharness.js:398:9\nrequest.onload@http://web-platform.test:8000/WebCryptoAPI/idlharness.worker.js:20:5\n"],["ArrayBufferView interface: existence and properties of interface object",0,{},{}],["Crypto interface: existence and properties of interface object",0,{},{}],["Crypto interface object length",0,{},{}],["Crypto interface object name",0,{},{}],["Crypto interface: existence and properties of interface prototype object",0,{},{}],["Crypto interface: existence and properties of interface prototype object's \"constructor\" property",0,{},{}],["Crypto interface: attribute subtle",0,{},{}],["Crypto interface: operation getRandomValues(ArrayBufferView)",0,{},{}],["Crypto must be primary interface of crypto",0,{},{}],["Stringification of crypto",0,{},{}],["Crypto interface: crypto must inherit property \"subtle\" with the proper type (0)",0,{},{}],["Crypto interface: crypto must inherit property \"getRandomValues\" with the proper type (1)",0,{},{}],["Crypto interface: calling getRandomValues(ArrayBufferView) on crypto with too few arguments must throw TypeError",0,{},{}],["CryptoKey interface: existence and properties of interface object",1,"assert_own_property: self does not have own property \"CryptoKey\" expected property \"CryptoKey\" missing","IdlInterface.prototype.test_self/<@http://web-platform.test:8000/resources/idlharness.js:767:9\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nIdlInterface.prototype.test_self@http://web-platform.test:8000/resources/idlharness.js:747:5\nIdlInterface.prototype.test@http://web-platform.test:8000/resources/idlharness.js:731:9\nIdlArray.prototype.test@http://web-platform.test:8000/resources/idlharness.js:398:9\nrequest.onload@http://web-platform.test:8000/WebCryptoAPI/idlharness.worker.js:20:5\n"],["CryptoKey interface object length",1,"assert_own_property: self does not have own property \"CryptoKey\" expected property \"CryptoKey\" missing","IdlInterface.prototype.test_self/<@http://web-platform.test:8000/resources/idlharness.js:858:13\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nIdlInterface.prototype.test_self@http://web-platform.test:8000/resources/idlharness.js:854:9\nIdlInterface.prototype.test@http://web-platform.test:8000/resources/idlharness.js:731:9\nIdlArray.prototype.test@http://web-platform.test:8000/resources/idlharness.js:398:9\nrequest.onload@http://web-platform.test:8000/WebCryptoAPI/idlharness.worker.js:20:5\n"],["CryptoKey interface object name",1,"assert_own_property: self does not have own property \"CryptoKey\" expected property \"CryptoKey\" missing","IdlInterface.prototype.test_self/<@http://web-platform.test:8000/resources/idlharness.js:885:13\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nIdlInterface.prototype.test_self@http://web-platform.test:8000/resources/idlharness.js:881:9\nIdlInterface.prototype.test@http://web-platform.test:8000/resources/idlharness.js:731:9\nIdlArray.prototype.test@http://web-platform.test:8000/resources/idlharness.js:398:9\nrequest.onload@http://web-platform.test:8000/WebCryptoAPI/idlharness.worker.js:20:5\n"],["CryptoKey interface: existence and properties of interface prototype object",1,"assert_own_property: self does not have own property \"CryptoKey\" expected property \"CryptoKey\" missing","IdlInterface.prototype.test_self/<@http://web-platform.test:8000/resources/idlharness.js:915:9\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nIdlInterface.prototype.test_self@http://web-platform.test:8000/resources/idlharness.js:906:5\nIdlInterface.prototype.test@http://web-platform.test:8000/resources/idlharness.js:731:9\nIdlArray.prototype.test@http://web-platform.test:8000/resources/idlharness.js:398:9\nrequest.onload@http://web-platform.test:8000/WebCryptoAPI/idlharness.worker.js:20:5\n"],["CryptoKey interface: existence and properties of interface prototype object's \"constructor\" property",1,"assert_own_property: self does not have own property \"CryptoKey\" expected property \"CryptoKey\" missing","IdlInterface.prototype.test_self/<@http://web-platform.test:8000/resources/idlharness.js:1018:9\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nIdlInterface.prototype.test_self@http://web-platform.test:8000/resources/idlharness.js:1012:5\nIdlInterface.prototype.test@http://web-platform.test:8000/resources/idlharness.js:731:9\nIdlArray.prototype.test@http://web-platform.test:8000/resources/idlharness.js:398:9\nrequest.onload@http://web-platform.test:8000/WebCryptoAPI/idlharness.worker.js:20:5\n"],["CryptoKey interface: attribute type",1,"assert_own_property: self does not have own property \"CryptoKey\" expected property \"CryptoKey\" missing","IdlInterface.prototype.test_member_attribute/<@http://web-platform.test:8000/resources/idlharness.js:1119:9\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nIdlInterface.prototype.test_member_attribute@http://web-platform.test:8000/resources/idlharness.js:1113:5\nIdlInterface.prototype.test_members@http://web-platform.test:8000/resources/idlharness.js:1395:17\nIdlInterface.prototype.test@http://web-platform.test:8000/resources/idlharness.js:740:5\nIdlArray.prototype.test@http://web-platform.test:8000/resources/idlharness.js:398:9\nrequest.onload@http://web-platform.test:8000/WebCryptoAPI/idlharness.worker.js:20:5\n"],["CryptoKey interface: attribute extractable",1,"assert_own_property: self does not have own property \"CryptoKey\" expected property \"CryptoKey\" missing","IdlInterface.prototype.test_member_attribute/<@http://web-platform.test:8000/resources/idlharness.js:1119:9\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nIdlInterface.prototype.test_member_attribute@http://web-platform.test:8000/resources/idlharness.js:1113:5\nIdlInterface.prototype.test_members@http://web-platform.test:8000/resources/idlharness.js:1395:17\nIdlInterface.prototype.test@http://web-platform.test:8000/resources/idlharness.js:740:5\nIdlArray.prototype.test@http://web-platform.test:8000/resources/idlharness.js:398:9\nrequest.onload@http://web-platform.test:8000/WebCryptoAPI/idlharness.worker.js:20:5\n"],["CryptoKey interface: attribute algorithm",1,"assert_own_property: self does not have own property \"CryptoKey\" expected property \"CryptoKey\" missing","IdlInterface.prototype.test_member_attribute/<@http://web-platform.test:8000/resources/idlharness.js:1119:9\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nIdlInterface.prototype.test_member_attribute@http://web-platform.test:8000/resources/idlharness.js:1113:5\nIdlInterface.prototype.test_members@http://web-platform.test:8000/resources/idlharness.js:1395:17\nIdlInterface.prototype.test@http://web-platform.test:8000/resources/idlharness.js:740:5\nIdlArray.prototype.test@http://web-platform.test:8000/resources/idlharness.js:398:9\nrequest.onload@http://web-platform.test:8000/WebCryptoAPI/idlharness.worker.js:20:5\n"],["CryptoKey interface: attribute usages",1,"assert_own_property: self does not have own property \"CryptoKey\" expected property \"CryptoKey\" missing","IdlInterface.prototype.test_member_attribute/<@http://web-platform.test:8000/resources/idlharness.js:1119:9\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nIdlInterface.prototype.test_member_attribute@http://web-platform.test:8000/resources/idlharness.js:1113:5\nIdlInterface.prototype.test_members@http://web-platform.test:8000/resources/idlharness.js:1395:17\nIdlInterface.prototype.test@http://web-platform.test:8000/resources/idlharness.js:740:5\nIdlArray.prototype.test@http://web-platform.test:8000/resources/idlharness.js:398:9\nrequest.onload@http://web-platform.test:8000/WebCryptoAPI/idlharness.worker.js:20:5\n"],["SubtleCrypto interface: existence and properties of interface object",0,{},{}],["SubtleCrypto interface object length",0,{},{}],["SubtleCrypto interface object name",0,{},{}],["SubtleCrypto interface: existence and properties of interface prototype object",0,{},{}],["SubtleCrypto interface: existence and properties of interface prototype object's \"constructor\" property",0,{},{}],["SubtleCrypto interface: operation encrypt(AlgorithmIdentifier,CryptoKey,BufferSource)",0,{},{}],["SubtleCrypto interface: operation decrypt(AlgorithmIdentifier,CryptoKey,BufferSource)",0,{},{}],["SubtleCrypto interface: operation sign(AlgorithmIdentifier,CryptoKey,BufferSource)",0,{},{}],["SubtleCrypto interface: operation verify(AlgorithmIdentifier,CryptoKey,BufferSource,BufferSource)",0,{},{}],["SubtleCrypto interface: operation digest(AlgorithmIdentifier,BufferSource)",0,{},{}],["SubtleCrypto interface: operation generateKey(AlgorithmIdentifier,boolean,[object Object])",0,{},{}],["SubtleCrypto interface: operation deriveKey(AlgorithmIdentifier,CryptoKey,AlgorithmIdentifier,boolean,[object Object])",0,{},{}],["SubtleCrypto interface: operation deriveBits(AlgorithmIdentifier,CryptoKey,unsigned long)",0,{},{}],["SubtleCrypto interface: operation importKey(KeyFormat,[object Object],[object Object],AlgorithmIdentifier,boolean,[object Object])",0,{},{}],["SubtleCrypto interface: operation exportKey(KeyFormat,CryptoKey)",0,{},{}],["SubtleCrypto interface: operation wrapKey(KeyFormat,CryptoKey,CryptoKey,AlgorithmIdentifier)",0,{},{}],["SubtleCrypto interface: operation unwrapKey(KeyFormat,BufferSource,CryptoKey,AlgorithmIdentifier,AlgorithmIdentifier,boolean,[object Object])",0,{},{}],["SubtleCrypto must be primary interface of crypto.subtle",0,{},{}],["Stringification of crypto.subtle",0,{},{}],["SubtleCrypto interface: crypto.subtle must inherit property \"encrypt\" with the proper type (0)",0,{},{}],["SubtleCrypto interface: calling encrypt(AlgorithmIdentifier,CryptoKey,BufferSource) on crypto.subtle with too few arguments must throw TypeError",0,{},{}],["SubtleCrypto interface: crypto.subtle must inherit property \"decrypt\" with the proper type (1)",0,{},{}],["SubtleCrypto interface: calling decrypt(AlgorithmIdentifier,CryptoKey,BufferSource) on crypto.subtle with too few arguments must throw TypeError",0,{},{}],["SubtleCrypto interface: crypto.subtle must inherit property \"sign\" with the proper type (2)",0,{},{}],["SubtleCrypto interface: calling sign(AlgorithmIdentifier,CryptoKey,BufferSource) on crypto.subtle with too few arguments must throw TypeError",0,{},{}],["SubtleCrypto interface: crypto.subtle must inherit property \"verify\" with the proper type (3)",0,{},{}],["SubtleCrypto interface: calling verify(AlgorithmIdentifier,CryptoKey,BufferSource,BufferSource) on crypto.subtle with too few arguments must throw TypeError",0,{},{}],["SubtleCrypto interface: crypto.subtle must inherit property \"digest\" with the proper type (4)",0,{},{}],["SubtleCrypto interface: calling digest(AlgorithmIdentifier,BufferSource) on crypto.subtle with too few arguments must throw TypeError",0,{},{}],["SubtleCrypto interface: crypto.subtle must inherit property \"generateKey\" with the proper type (5)",0,{},{}],["SubtleCrypto interface: calling generateKey(AlgorithmIdentifier,boolean,[object Object]) on crypto.subtle with too few arguments must throw TypeError",0,{},{}],["SubtleCrypto interface: crypto.subtle must inherit property \"deriveKey\" with the proper type (6)",0,{},{}],["SubtleCrypto interface: calling deriveKey(AlgorithmIdentifier,CryptoKey,AlgorithmIdentifier,boolean,[object Object]) on crypto.subtle with too few arguments must throw TypeError",0,{},{}],["SubtleCrypto interface: crypto.subtle must inherit property \"deriveBits\" with the proper type (7)",0,{},{}],["SubtleCrypto interface: calling deriveBits(AlgorithmIdentifier,CryptoKey,unsigned long) on crypto.subtle with too few arguments must throw TypeError",0,{},{}],["SubtleCrypto interface: crypto.subtle must inherit property \"importKey\" with the proper type (8)",0,{},{}],["SubtleCrypto interface: calling importKey(KeyFormat,[object Object],[object Object],AlgorithmIdentifier,boolean,[object Object]) on crypto.subtle with too few arguments must throw TypeError",0,{},{}],["SubtleCrypto interface: crypto.subtle must inherit property \"exportKey\" with the proper type (9)",0,{},{}],["SubtleCrypto interface: calling exportKey(KeyFormat,CryptoKey) on crypto.subtle with too few arguments must throw TypeError",0,{},{}],["SubtleCrypto interface: crypto.subtle must inherit property \"wrapKey\" with the proper type (10)",0,{},{}],["SubtleCrypto interface: calling wrapKey(KeyFormat,CryptoKey,CryptoKey,AlgorithmIdentifier) on crypto.subtle with too few arguments must throw TypeError",0,{},{}],["SubtleCrypto interface: crypto.subtle must inherit property \"unwrapKey\" with the proper type (11)",0,{},{}],["SubtleCrypto interface: calling unwrapKey(KeyFormat,BufferSource,CryptoKey,AlgorithmIdentifier,AlgorithmIdentifier,boolean,[object Object]) on crypto.subtle with too few arguments must throw TypeError",0,{},{}]]]}] 03:22:45 INFO - ................................................................... 03:22:45 INFO - TEST-OK | /WebCryptoAPI/idlharness.worker | took 1371ms 03:22:45 INFO - PROCESS | 3752 | 1483615365288 Marionette TRACE conn4 -> [0,205,"getWindowHandle",null] 03:22:45 INFO - PROCESS | 3752 | 1483615365291 Marionette TRACE conn4 <- [1,205,null,{"value":"12"}] 03:22:45 INFO - TEST-START | /WebCryptoAPI/test_getRandomValues.html 03:22:45 INFO - PROCESS | 3752 | 1483615365295 Marionette TRACE conn4 -> [0,206,"timeouts",{"script":35000}] 03:22:45 INFO - PROCESS | 3752 | 1483615365281 Marionette TRACE conn4 <- [1,206,null,{}] 03:22:45 INFO - PROCESS | 3752 | 1483615365284 Marionette TRACE conn4 -> [0,207,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:45 INFO - PROCESS | 3752 | 1483615365374 Marionette TRACE conn4 <- [1,207,null,{"value":null}] 03:22:45 INFO - PROCESS | 3752 | 1483615365380 Marionette TRACE conn4 -> [0,208,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/test_getRandomValues.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/test_getRandomValues.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:45 INFO - PROCESS | 3752 | ++DOCSHELL 17C9BC00 == 15 [pid = 3752] [id = 60] 03:22:45 INFO - PROCESS | 3752 | ++DOMWINDOW == 37 (17C9C000) [pid = 3752] [serial = 181] [outer = 00000000] 03:22:45 INFO - PROCESS | 3752 | ++DOMWINDOW == 38 (188F1000) [pid = 3752] [serial = 182] [outer = 17C9C000] 03:22:45 INFO - PROCESS | 3752 | 1483615365433 Marionette DEBUG loaded listener.js 03:22:45 INFO - PROCESS | 3752 | ++DOMWINDOW == 39 (188F5400) [pid = 3752] [serial = 183] [outer = 17C9C000] 03:22:45 INFO - PROCESS | 3752 | [3752] WARNING: ArrayBufferView length is 0, cannot continue: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/base/Crypto.cpp, line 88 03:22:45 INFO - PROCESS | 3752 | [3752] WARNING: ArrayBufferView length is 0, cannot continue: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/base/Crypto.cpp, line 88 03:22:45 INFO - PROCESS | 3752 | [3752] WARNING: ArrayBufferView length is 0, cannot continue: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/base/Crypto.cpp, line 88 03:22:45 INFO - PROCESS | 3752 | [3752] WARNING: ArrayBufferView length is 0, cannot continue: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/base/Crypto.cpp, line 88 03:22:45 INFO - PROCESS | 3752 | [3752] WARNING: ArrayBufferView length is 0, cannot continue: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/base/Crypto.cpp, line 88 03:22:45 INFO - PROCESS | 3752 | [3752] WARNING: ArrayBufferView length is 0, cannot continue: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/base/Crypto.cpp, line 88 03:22:45 INFO - PROCESS | 3752 | [3752] WARNING: ArrayBufferView length is 0, cannot continue: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/base/Crypto.cpp, line 88 03:22:45 INFO - PROCESS | 3752 | 1483615365783 Marionette TRACE conn4 <- [1,208,null,{"value":["/WebCryptoAPI/test_getRandomValues.html",0,null,null,[["Float arrays",0,null,null],["Integer array",0,null,null],["Large length",0,null,null],["Null arrays",0,null,null]]]}] 03:22:45 INFO - .... 03:22:45 INFO - TEST-OK | /WebCryptoAPI/test_getRandomValues.html | took 530ms 03:22:45 INFO - PROCESS | 3752 | 1483615365811 Marionette TRACE conn4 -> [0,209,"getWindowHandle",null] 03:22:45 INFO - PROCESS | 3752 | 1483615365814 Marionette TRACE conn4 <- [1,209,null,{"value":"12"}] 03:22:45 INFO - PROCESS | 3752 | 1483615365821 Marionette TRACE conn4 -> [0,210,"timeouts",{"script":35000}] 03:22:45 INFO - TEST-START | /WebCryptoAPI/sign_verify/ecdsa.worker 03:22:45 INFO - PROCESS | 3752 | 1483615365823 Marionette TRACE conn4 <- [1,210,null,{}] 03:22:45 INFO - PROCESS | 3752 | 1483615365827 Marionette TRACE conn4 -> [0,211,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:45 INFO - PROCESS | 3752 | 1483615365941 Marionette TRACE conn4 <- [1,211,null,{"value":null}] 03:22:45 INFO - PROCESS | 3752 | 1483615366002 Marionette TRACE conn4 -> [0,212,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/sign_verify/ecdsa.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/sign_verify/ecdsa.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:46 INFO - PROCESS | 3752 | ++DOCSHELL 184B6400 == 16 [pid = 3752] [id = 61] 03:22:46 INFO - PROCESS | 3752 | ++DOMWINDOW == 40 (188F0000) [pid = 3752] [serial = 184] [outer = 00000000] 03:22:46 INFO - PROCESS | 3752 | ++DOMWINDOW == 41 (18B76800) [pid = 3752] [serial = 185] [outer = 188F0000] 03:22:46 INFO - PROCESS | 3752 | 1483615366071 Marionette DEBUG loaded listener.js 03:22:46 INFO - PROCESS | 3752 | ++DOMWINDOW == 42 (194B8400) [pid = 3752] [serial = 186] [outer = 188F0000] 03:22:46 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:22:47 INFO - PROCESS | 3752 | 1483615367871 Marionette TRACE conn4 <- [1,212,null,{"value":["/WebCryptoAPI/sign_verify/ecdsa.worker",0,null,null,[["importVectorKeys step: ECDSA P-256 with SHA-1 verification",1,"assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code","run_test/ [0,213,"getWindowHandle",null] 03:22:48 INFO - TEST-START | /WebCryptoAPI/sign_verify/hmac.worker 03:22:48 INFO - PROCESS | 3752 | 1483615368069 Marionette TRACE conn4 <- [1,213,null,{"value":"12"}] 03:22:48 INFO - PROCESS | 3752 | 1483615368075 Marionette TRACE conn4 -> [0,214,"timeouts",{"script":35000}] 03:22:48 INFO - PROCESS | 3752 | 1483615368083 Marionette TRACE conn4 <- [1,214,null,{}] 03:22:48 INFO - PROCESS | 3752 | 1483615368101 Marionette TRACE conn4 -> [0,215,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:48 INFO - PROCESS | 3752 | 1483615368250 Marionette TRACE conn4 <- [1,215,null,{"value":null}] 03:22:48 INFO - PROCESS | 3752 | 1483615368332 Marionette TRACE conn4 -> [0,216,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/sign_verify/hmac.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/sign_verify/hmac.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:48 INFO - PROCESS | 3752 | ++DOCSHELL 0F693800 == 17 [pid = 3752] [id = 62] 03:22:48 INFO - PROCESS | 3752 | ++DOMWINDOW == 43 (0F696C00) [pid = 3752] [serial = 187] [outer = 00000000] 03:22:48 INFO - PROCESS | 3752 | ++DOMWINDOW == 44 (12151800) [pid = 3752] [serial = 188] [outer = 0F696C00] 03:22:48 INFO - PROCESS | 3752 | 1483615368409 Marionette DEBUG loaded listener.js 03:22:48 INFO - PROCESS | 3752 | ++DOMWINDOW == 45 (13FE9800) [pid = 3752] [serial = 189] [outer = 0F696C00] 03:22:48 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:22:49 INFO - PROCESS | 3752 | 1483615369301 Marionette TRACE conn4 <- [1,216,null,{"value":["/WebCryptoAPI/sign_verify/hmac.worker",0,null,null,[["HMAC with SHA-1 verification",0,{},{}],["HMAC with SHA-256 verification",0,{},{}],["HMAC with SHA-384 verification",0,{},{}],["HMAC with SHA-512 verification",0,{},{}],["HMAC with SHA-1 verification with altered signature after call",0,{},{}],["HMAC with SHA-256 verification with altered signature after call",0,{},{}],["HMAC with SHA-384 verification with altered signature after call",0,{},{}],["HMAC with SHA-512 verification with altered signature after call",0,{},{}],["HMAC with SHA-1 with altered plaintext after call",0,{},{}],["HMAC with SHA-256 with altered plaintext after call",0,{},{}],["HMAC with SHA-384 with altered plaintext after call",0,{},{}],["HMAC with SHA-512 with altered plaintext after call",0,{},{}],["HMAC with SHA-1 no verify usage",0,{},{}],["HMAC with SHA-256 no verify usage",0,{},{}],["HMAC with SHA-384 no verify usage",0,{},{}],["HMAC with SHA-512 no verify usage",0,{},{}],["HMAC with SHA-1 round trip",0,{},{}],["HMAC with SHA-256 round trip",0,{},{}],["HMAC with SHA-384 round trip",0,{},{}],["HMAC with SHA-512 round trip",0,{},{}],["HMAC with SHA-1 verification failure due to wrong plaintext",0,{},{}],["HMAC with SHA-256 verification failure due to wrong plaintext",0,{},{}],["HMAC with SHA-384 verification failure due to wrong plaintext",0,{},{}],["HMAC with SHA-512 verification failure due to wrong plaintext",0,{},{}],["HMAC with SHA-1 verification failure due to wrong signature",0,{},{}],["HMAC with SHA-256 verification failure due to wrong signature",0,{},{}],["HMAC with SHA-384 verification failure due to wrong signature",0,{},{}],["HMAC with SHA-512 verification failure due to wrong signature",0,{},{}],["HMAC with SHA-1 verification failure due to short signature",0,{},{}],["HMAC with SHA-256 verification failure due to short signature",0,{},{}],["HMAC with SHA-384 verification failure due to short signature",0,{},{}],["HMAC with SHA-512 verification failure due to short signature",0,{},{}],["HMAC with SHA-1 signing with wrong algorithm name",0,{},{}],["HMAC with SHA-256 signing with wrong algorithm name",0,{},{}],["HMAC with SHA-384 signing with wrong algorithm name",0,{},{}],["HMAC with SHA-512 signing with wrong algorithm name",0,{},{}],["HMAC with SHA-1 verifying with wrong algorithm name",0,{},{}],["HMAC with SHA-256 verifying with wrong algorithm name",0,{},{}],["HMAC with SHA-384 verifying with wrong algorithm name",0,{},{}],["HMAC with SHA-512 verifying with wrong algorithm name",0,{},{}]]]}] 03:22:49 INFO - PROCESS | 3752 | --DOMWINDOW == 44 (13FEC800) [pid = 3752] [serial = 147] [outer = 00000000] [url = about:blank] 03:22:49 INFO - PROCESS | 3752 | --DOMWINDOW == 43 (1698A400) [pid = 3752] [serial = 167] [outer = 00000000] [url = about:blank] 03:22:49 INFO - PROCESS | 3752 | --DOMWINDOW == 42 (0FBB2800) [pid = 3752] [serial = 159] [outer = 00000000] [url = about:blank] 03:22:49 INFO - PROCESS | 3752 | --DOMWINDOW == 41 (11CB4400) [pid = 3752] [serial = 156] [outer = 00000000] [url = about:blank] 03:22:49 INFO - PROCESS | 3752 | --DOMWINDOW == 40 (14B69800) [pid = 3752] [serial = 164] [outer = 00000000] [url = about:blank] 03:22:49 INFO - PROCESS | 3752 | --DOMWINDOW == 39 (12DE6400) [pid = 3752] [serial = 153] [outer = 00000000] [url = about:blank] 03:22:49 INFO - PROCESS | 3752 | --DOMWINDOW == 38 (14BBBC00) [pid = 3752] [serial = 165] [outer = 00000000] [url = about:blank] 03:22:49 INFO - PROCESS | 3752 | --DOMWINDOW == 37 (13FE6C00) [pid = 3752] [serial = 162] [outer = 00000000] [url = about:blank] 03:22:49 INFO - PROCESS | 3752 | --DOMWINDOW == 36 (13D7AC00) [pid = 3752] [serial = 161] [outer = 00000000] [url = about:blank] 03:22:49 INFO - PROCESS | 3752 | --DOMWINDOW == 35 (0FBB8000) [pid = 3752] [serial = 158] [outer = 00000000] [url = about:blank] 03:22:49 INFO - PROCESS | 3752 | --DOMWINDOW == 34 (11E29400) [pid = 3752] [serial = 155] [outer = 00000000] [url = about:blank] 03:22:49 INFO - ........................................ 03:22:49 INFO - TEST-OK | /WebCryptoAPI/sign_verify/hmac.worker | took 1294ms 03:22:49 INFO - PROCESS | 3752 | 1483615369368 Marionette TRACE conn4 -> [0,217,"getWindowHandle",null] 03:22:49 INFO - PROCESS | 3752 | 1483615369373 Marionette TRACE conn4 <- [1,217,null,{"value":"12"}] 03:22:49 INFO - TEST-START | /WebCryptoAPI/sign_verify/rsa_pkcs.worker 03:22:49 INFO - PROCESS | 3752 | 1483615369380 Marionette TRACE conn4 -> [0,218,"timeouts",{"script":35000}] 03:22:49 INFO - PROCESS | 3752 | 1483615369384 Marionette TRACE conn4 <- [1,218,null,{}] 03:22:49 INFO - PROCESS | 3752 | 1483615369393 Marionette TRACE conn4 -> [0,219,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:49 INFO - PROCESS | 3752 | 1483615369493 Marionette TRACE conn4 <- [1,219,null,{"value":null}] 03:22:49 INFO - PROCESS | 3752 | 1483615369500 Marionette TRACE conn4 -> [0,220,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/sign_verify/rsa_pkcs.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/sign_verify/rsa_pkcs.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:49 INFO - PROCESS | 3752 | ++DOCSHELL 12DEC400 == 18 [pid = 3752] [id = 63] 03:22:49 INFO - PROCESS | 3752 | ++DOMWINDOW == 35 (13D81400) [pid = 3752] [serial = 190] [outer = 00000000] 03:22:49 INFO - PROCESS | 3752 | ++DOMWINDOW == 36 (14776400) [pid = 3752] [serial = 191] [outer = 13D81400] 03:22:49 INFO - PROCESS | 3752 | 1483615369560 Marionette DEBUG loaded listener.js 03:22:49 INFO - PROCESS | 3752 | ++DOMWINDOW == 37 (1449AC00) [pid = 3752] [serial = 192] [outer = 13D81400] 03:22:49 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:22:50 INFO - PROCESS | 3752 | 1483615370405 Marionette TRACE conn4 <- [1,220,null,{"value":["/WebCryptoAPI/sign_verify/rsa_pkcs.worker",0,null,null,[["RSASSA-PKCS1-v1_5 with SHA-1 verification",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-256 verification",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-384 verification",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-512 verification",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-1 verification with altered signature after call",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-256 verification with altered signature after call",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-384 verification with altered signature after call",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-512 verification with altered signature after call",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-1 with altered plaintext after call",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-256 with altered plaintext after call",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-384 with altered plaintext after call",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-512 with altered plaintext after call",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-1 using privateKey to verify",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-256 using privateKey to verify",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-384 using privateKey to verify",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-512 using privateKey to verify",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-1 using publicKey to sign",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-256 using publicKey to sign",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-384 using publicKey to sign",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-512 using publicKey to sign",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-1 no verify usage",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-256 no verify usage",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-384 no verify usage",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-512 no verify usage",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-1 round trip",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-256 round trip",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-384 round trip",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-512 round trip",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-1 signing with wrong algorithm name",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-256 signing with wrong algorithm name",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-384 signing with wrong algorithm name",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-512 signing with wrong algorithm name",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-1 verification with wrong algorithm name",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-256 verification with wrong algorithm name",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-384 verification with wrong algorithm name",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-512 verification with wrong algorithm name",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered signature",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered signature",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered signature",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered signature",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered plaintext",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered plaintext",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered plaintext",0,{},{}],["RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered plaintext",0,{},{}]]]}] 03:22:50 INFO - ............................................ 03:22:50 INFO - TEST-OK | /WebCryptoAPI/sign_verify/rsa_pkcs.worker | took 1060ms 03:22:50 INFO - PROCESS | 3752 | 1483615370445 Marionette TRACE conn4 -> [0,221,"getWindowHandle",null] 03:22:50 INFO - PROCESS | 3752 | 1483615370452 Marionette TRACE conn4 <- [1,221,null,{"value":"12"}] 03:22:50 INFO - PROCESS | 3752 | 1483615370459 Marionette TRACE conn4 -> [0,222,"timeouts",{"script":35000}] 03:22:50 INFO - TEST-START | /WebCryptoAPI/sign_verify/rsa_pss.worker 03:22:50 INFO - PROCESS | 3752 | 1483615370464 Marionette TRACE conn4 <- [1,222,null,{}] 03:22:50 INFO - PROCESS | 3752 | 1483615370469 Marionette TRACE conn4 -> [0,223,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:50 INFO - PROCESS | 3752 | 1483615370571 Marionette TRACE conn4 <- [1,223,null,{"value":null}] 03:22:50 INFO - PROCESS | 3752 | 1483615370577 Marionette TRACE conn4 -> [0,224,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/sign_verify/rsa_pss.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/sign_verify/rsa_pss.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:50 INFO - PROCESS | 3752 | ++DOCSHELL 160D7C00 == 19 [pid = 3752] [id = 64] 03:22:50 INFO - PROCESS | 3752 | ++DOMWINDOW == 38 (160D8000) [pid = 3752] [serial = 193] [outer = 00000000] 03:22:50 INFO - PROCESS | 3752 | ++DOMWINDOW == 39 (16987000) [pid = 3752] [serial = 194] [outer = 160D8000] 03:22:50 INFO - PROCESS | 3752 | 1483615370663 Marionette DEBUG loaded listener.js 03:22:50 INFO - PROCESS | 3752 | ++DOMWINDOW == 40 (1698B400) [pid = 3752] [serial = 195] [outer = 160D8000] 03:22:50 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:22:51 INFO - PROCESS | 3752 | 1483615371900 Marionette TRACE conn4 <- [1,224,null,{"value":["/WebCryptoAPI/sign_verify/rsa_pss.worker",0,null,null,[["RSA-PSS with SHA-1 and no salt verification",0,{},{}],["RSA-PSS with SHA-256 and no salt verification",0,{},{}],["RSA-PSS with SHA-384 and no salt verification",0,{},{}],["RSA-PSS with SHA-512 and no salt verification",0,{},{}],["RSA-PSS with SHA-1, salted verification",0,{},{}],["RSA-PSS with SHA-256, salted verification",0,{},{}],["RSA-PSS with SHA-384, salted verification",0,{},{}],["RSA-PSS with SHA-512, salted verification",0,{},{}],["RSA-PSS with SHA-1 and no salt verification with altered signature after call",0,{},{}],["RSA-PSS with SHA-256 and no salt verification with altered signature after call",0,{},{}],["RSA-PSS with SHA-384 and no salt verification with altered signature after call",0,{},{}],["RSA-PSS with SHA-512 and no salt verification with altered signature after call",0,{},{}],["RSA-PSS with SHA-1, salted verification with altered signature after call",0,{},{}],["RSA-PSS with SHA-256, salted verification with altered signature after call",0,{},{}],["RSA-PSS with SHA-384, salted verification with altered signature after call",0,{},{}],["RSA-PSS with SHA-512, salted verification with altered signature after call",0,{},{}],["RSA-PSS with SHA-1 and no salt with altered plaintext after call",0,{},{}],["RSA-PSS with SHA-256 and no salt with altered plaintext after call",0,{},{}],["RSA-PSS with SHA-384 and no salt with altered plaintext after call",0,{},{}],["RSA-PSS with SHA-512 and no salt with altered plaintext after call",0,{},{}],["RSA-PSS with SHA-1, salted with altered plaintext after call",0,{},{}],["RSA-PSS with SHA-256, salted with altered plaintext after call",0,{},{}],["RSA-PSS with SHA-384, salted with altered plaintext after call",0,{},{}],["RSA-PSS with SHA-512, salted with altered plaintext after call",0,{},{}],["RSA-PSS with SHA-1 and no salt using privateKey to verify",0,{},{}],["RSA-PSS with SHA-256 and no salt using privateKey to verify",0,{},{}],["RSA-PSS with SHA-384 and no salt using privateKey to verify",0,{},{}],["RSA-PSS with SHA-512 and no salt using privateKey to verify",0,{},{}],["RSA-PSS with SHA-1, salted using privateKey to verify",0,{},{}],["RSA-PSS with SHA-256, salted using privateKey to verify",0,{},{}],["RSA-PSS with SHA-384, salted using privateKey to verify",0,{},{}],["RSA-PSS with SHA-512, salted using privateKey to verify",0,{},{}],["RSA-PSS with SHA-1 and no salt using publicKey to sign",0,{},{}],["RSA-PSS with SHA-256 and no salt using publicKey to sign",0,{},{}],["RSA-PSS with SHA-384 and no salt using publicKey to sign",0,{},{}],["RSA-PSS with SHA-512 and no salt using publicKey to sign",0,{},{}],["RSA-PSS with SHA-1, salted using publicKey to sign",0,{},{}],["RSA-PSS with SHA-256, salted using publicKey to sign",0,{},{}],["RSA-PSS with SHA-384, salted using publicKey to sign",0,{},{}],["RSA-PSS with SHA-512, salted using publicKey to sign",0,{},{}],["RSA-PSS with SHA-1 and no salt no verify usage",0,{},{}],["RSA-PSS with SHA-256 and no salt no verify usage",0,{},{}],["RSA-PSS with SHA-384 and no salt no verify usage",0,{},{}],["RSA-PSS with SHA-512 and no salt no verify usage",0,{},{}],["RSA-PSS with SHA-1, salted no verify usage",0,{},{}],["RSA-PSS with SHA-256, salted no verify usage",0,{},{}],["RSA-PSS with SHA-384, salted no verify usage",0,{},{}],["RSA-PSS with SHA-512, salted no verify usage",0,{},{}],["RSA-PSS with SHA-1 and no salt round trip",0,{},{}],["RSA-PSS with SHA-256 and no salt round trip",0,{},{}],["RSA-PSS with SHA-384 and no salt round trip",0,{},{}],["RSA-PSS with SHA-512 and no salt round trip",0,{},{}],["RSA-PSS with SHA-1, salted round trip",0,{},{}],["RSA-PSS with SHA-256, salted round trip",0,{},{}],["RSA-PSS with SHA-384, salted round trip",0,{},{}],["RSA-PSS with SHA-512, salted round trip",0,{},{}],["RSA-PSS with SHA-1 and no salt signing with wrong algorithm name",0,{},{}],["RSA-PSS with SHA-256 and no salt signing with wrong algorithm name",0,{},{}],["RSA-PSS with SHA-384 and no salt signing with wrong algorithm name",0,{},{}],["RSA-PSS with SHA-512 and no salt signing with wrong algorithm name",0,{},{}],["RSA-PSS with SHA-1, salted signing with wrong algorithm name",0,{},{}],["RSA-PSS with SHA-256, salted signing with wrong algorithm name",0,{},{}],["RSA-PSS with SHA-384, salted signing with wrong algorithm name",0,{},{}],["RSA-PSS with SHA-512, salted signing with wrong algorithm name",0,{},{}],["RSA-PSS with SHA-1 and no salt verification with wrong algorithm name",0,{},{}],["RSA-PSS with SHA-256 and no salt verification with wrong algorithm name",0,{},{}],["RSA-PSS with SHA-384 and no salt verification with wrong algorithm name",0,{},{}],["RSA-PSS with SHA-512 and no salt verification with wrong algorithm name",0,{},{}],["RSA-PSS with SHA-1, salted verification with wrong algorithm name",0,{},{}],["RSA-PSS with SHA-256, salted verification with wrong algorithm name",0,{},{}],["RSA-PSS with SHA-384, salted verification with wrong algorithm name",0,{},{}],["RSA-PSS with SHA-512, salted verification with wrong algorithm name",0,{},{}],["RSA-PSS with SHA-1 and no salt verification failure with altered signature",0,{},{}],["RSA-PSS with SHA-256 and no salt verification failure with altered signature",0,{},{}],["RSA-PSS with SHA-384 and no salt verification failure with altered signature",0,{},{}],["RSA-PSS with SHA-512 and no salt verification failure with altered signature",0,{},{}],["RSA-PSS with SHA-1, salted verification failure with altered signature",0,{},{}],["RSA-PSS with SHA-256, salted verification failure with altered signature",0,{},{}],["RSA-PSS with SHA-384, salted verification failure with altered signature",0,{},{}],["RSA-PSS with SHA-512, salted verification failure with altered signature",0,{},{}],["RSA-PSS with SHA-1 and no salt verification failure with altered plaintext",0,{},{}],["RSA-PSS with SHA-256 and no salt verification failure with altered plaintext",0,{},{}],["RSA-PSS with SHA-384 and no salt verification failure with altered plaintext",0,{},{}],["RSA-PSS with SHA-512 and no salt verification failure with altered plaintext",0,{},{}],["RSA-PSS with SHA-1, salted verification failure with altered plaintext",0,{},{}],["RSA-PSS with SHA-256, salted verification failure with altered plaintext",0,{},{}],["RSA-PSS with SHA-384, salted verification failure with altered plaintext",0,{},{}],["RSA-PSS with SHA-512, salted verification failure with altered plaintext",0,{},{}]]]}] 03:22:51 INFO - ........................................................................................ 03:22:51 INFO - TEST-OK | /WebCryptoAPI/sign_verify/rsa_pss.worker | took 1558ms 03:22:52 INFO - PROCESS | 3752 | 1483615372013 Marionette TRACE conn4 -> [0,225,"getWindowHandle",null] 03:22:52 INFO - PROCESS | 3752 | 1483615372016 Marionette TRACE conn4 <- [1,225,null,{"value":"12"}] 03:22:52 INFO - PROCESS | 3752 | 1483615372024 Marionette TRACE conn4 -> [0,226,"timeouts",{"script":185000}] 03:22:52 INFO - TEST-START | /WebCryptoAPI/sign_verify/test_ecdsa.html 03:22:52 INFO - PROCESS | 3752 | 1483615372030 Marionette TRACE conn4 <- [1,226,null,{}] 03:22:52 INFO - PROCESS | 3752 | 1483615372042 Marionette TRACE conn4 -> [0,227,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:52 INFO - PROCESS | 3752 | 1483615372167 Marionette TRACE conn4 <- [1,227,null,{"value":null}] 03:22:52 INFO - PROCESS | 3752 | 1483615372175 Marionette TRACE conn4 -> [0,228,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/sign_verify/test_ecdsa.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/sign_verify/test_ecdsa.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:52 INFO - PROCESS | 3752 | ++DOCSHELL 18435800 == 20 [pid = 3752] [id = 65] 03:22:52 INFO - PROCESS | 3752 | ++DOMWINDOW == 41 (18435C00) [pid = 3752] [serial = 196] [outer = 00000000] 03:22:52 INFO - PROCESS | 3752 | ++DOMWINDOW == 42 (18439800) [pid = 3752] [serial = 197] [outer = 18435C00] 03:22:52 INFO - PROCESS | 3752 | 1483615372276 Marionette DEBUG loaded listener.js 03:22:52 INFO - PROCESS | 3752 | ++DOMWINDOW == 43 (18438400) [pid = 3752] [serial = 198] [outer = 18435C00] 03:22:52 INFO - PROCESS | 3752 | JavaScript warning: http://web-platform.test:8000/WebCryptoAPI/sign_verify/ecdsa.js, line 478: unreachable code after return statement 03:22:52 INFO - PROCESS | 3752 | JavaScript warning: http://web-platform.test:8000/WebCryptoAPI/sign_verify/ecdsa.js, line 478: unreachable code after return statement 03:22:53 INFO - PROCESS | 3752 | --DOMWINDOW == 42 (12BF3800) [pid = 3752] [serial = 172] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/getRandomValues.worker] 03:22:53 INFO - PROCESS | 3752 | --DOMWINDOW == 41 (16837C00) [pid = 3752] [serial = 166] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/test_successes_ECDSA.html] 03:22:53 INFO - PROCESS | 3752 | --DOMWINDOW == 40 (0FE46800) [pid = 3752] [serial = 169] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/generateKey/test_successes_HMAC.html] 03:22:53 INFO - PROCESS | 3752 | --DOMWINDOW == 39 (17C9C000) [pid = 3752] [serial = 181] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/test_getRandomValues.html] 03:22:53 INFO - PROCESS | 3752 | --DOMWINDOW == 38 (1441FC00) [pid = 3752] [serial = 175] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/idlharness.html] 03:22:53 INFO - PROCESS | 3752 | --DOMWINDOW == 37 (16FA5000) [pid = 3752] [serial = 178] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/idlharness.worker] 03:22:53 INFO - PROCESS | 3752 | 1483615373062 Marionette TRACE conn4 <- [1,228,null,{"value":["/WebCryptoAPI/sign_verify/test_ecdsa.html",0,null,null,[["importVectorKeys step: ECDSA P-256 with SHA-1 verification",1,"assert_unreached: importVectorKeys failed for ECDSA P-256 with SHA-1. Message: ''Operation is not supported'' Reached unreachable code","run_test/ [0,229,"getWindowHandle",null] 03:22:53 INFO - TEST-START | /WebCryptoAPI/sign_verify/test_hmac.html 03:22:53 INFO - PROCESS | 3752 | 1483615373154 Marionette TRACE conn4 <- [1,229,null,{"value":"12"}] 03:22:53 INFO - PROCESS | 3752 | 1483615373157 Marionette TRACE conn4 -> [0,230,"timeouts",{"script":185000}] 03:22:53 INFO - PROCESS | 3752 | 1483615373160 Marionette TRACE conn4 <- [1,230,null,{}] 03:22:53 INFO - PROCESS | 3752 | 1483615373165 Marionette TRACE conn4 -> [0,231,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:53 INFO - PROCESS | 3752 | 1483615373304 Marionette TRACE conn4 <- [1,231,null,{"value":null}] 03:22:53 INFO - PROCESS | 3752 | 1483615373377 Marionette TRACE conn4 -> [0,232,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/sign_verify/test_hmac.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/sign_verify/test_hmac.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:53 INFO - PROCESS | 3752 | ++DOCSHELL 13FF3C00 == 21 [pid = 3752] [id = 66] 03:22:53 INFO - PROCESS | 3752 | ++DOMWINDOW == 38 (140C0C00) [pid = 3752] [serial = 199] [outer = 00000000] 03:22:53 INFO - PROCESS | 3752 | ++DOMWINDOW == 39 (184BEC00) [pid = 3752] [serial = 200] [outer = 140C0C00] 03:22:53 INFO - PROCESS | 3752 | 1483615373442 Marionette DEBUG loaded listener.js 03:22:53 INFO - PROCESS | 3752 | ++DOMWINDOW == 40 (184BA000) [pid = 3752] [serial = 201] [outer = 140C0C00] 03:22:53 INFO - PROCESS | 3752 | JavaScript warning: http://web-platform.test:8000/WebCryptoAPI/sign_verify/hmac.js, line 346: unreachable code after return statement 03:22:53 INFO - PROCESS | 3752 | JavaScript warning: http://web-platform.test:8000/WebCryptoAPI/sign_verify/hmac.js, line 346: unreachable code after return statement 03:22:53 INFO - PROCESS | 3752 | 1483615373960 Marionette TRACE conn4 <- [1,232,null,{"value":["/WebCryptoAPI/sign_verify/test_hmac.html",0,null,null,[["HMAC with SHA-1 verification",0,null,null],["HMAC with SHA-256 verification",0,null,null],["HMAC with SHA-384 verification",0,null,null],["HMAC with SHA-512 verification",0,null,null],["HMAC with SHA-1 verification with altered signature after call",0,null,null],["HMAC with SHA-256 verification with altered signature after call",0,null,null],["HMAC with SHA-384 verification with altered signature after call",0,null,null],["HMAC with SHA-512 verification with altered signature after call",0,null,null],["HMAC with SHA-1 with altered plaintext after call",0,null,null],["HMAC with SHA-256 with altered plaintext after call",0,null,null],["HMAC with SHA-384 with altered plaintext after call",0,null,null],["HMAC with SHA-512 with altered plaintext after call",0,null,null],["HMAC with SHA-1 no verify usage",0,null,null],["HMAC with SHA-256 no verify usage",0,null,null],["HMAC with SHA-384 no verify usage",0,null,null],["HMAC with SHA-512 no verify usage",0,null,null],["HMAC with SHA-1 round trip",0,null,null],["HMAC with SHA-256 round trip",0,null,null],["HMAC with SHA-384 round trip",0,null,null],["HMAC with SHA-512 round trip",0,null,null],["HMAC with SHA-1 verification failure due to wrong plaintext",0,null,null],["HMAC with SHA-256 verification failure due to wrong plaintext",0,null,null],["HMAC with SHA-384 verification failure due to wrong plaintext",0,null,null],["HMAC with SHA-512 verification failure due to wrong plaintext",0,null,null],["HMAC with SHA-1 verification failure due to wrong signature",0,null,null],["HMAC with SHA-256 verification failure due to wrong signature",0,null,null],["HMAC with SHA-384 verification failure due to wrong signature",0,null,null],["HMAC with SHA-512 verification failure due to wrong signature",0,null,null],["HMAC with SHA-1 verification failure due to short signature",0,null,null],["HMAC with SHA-256 verification failure due to short signature",0,null,null],["HMAC with SHA-384 verification failure due to short signature",0,null,null],["HMAC with SHA-512 verification failure due to short signature",0,null,null],["HMAC with SHA-1 signing with wrong algorithm name",0,null,null],["HMAC with SHA-256 signing with wrong algorithm name",0,null,null],["HMAC with SHA-384 signing with wrong algorithm name",0,null,null],["HMAC with SHA-512 signing with wrong algorithm name",0,null,null],["HMAC with SHA-1 verifying with wrong algorithm name",0,null,null],["HMAC with SHA-256 verifying with wrong algorithm name",0,null,null],["HMAC with SHA-384 verifying with wrong algorithm name",0,null,null],["HMAC with SHA-512 verifying with wrong algorithm name",0,null,null]]]}] 03:22:53 INFO - ........................................ 03:22:53 INFO - TEST-OK | /WebCryptoAPI/sign_verify/test_hmac.html | took 842ms 03:22:54 INFO - TEST-START | /WebCryptoAPI/sign_verify/test_rsa_pkcs.html 03:22:54 INFO - PROCESS | 3752 | 1483615374012 Marionette TRACE conn4 -> [0,233,"getWindowHandle",null] 03:22:54 INFO - PROCESS | 3752 | 1483615374015 Marionette TRACE conn4 <- [1,233,null,{"value":"12"}] 03:22:54 INFO - PROCESS | 3752 | 1483615374019 Marionette TRACE conn4 -> [0,234,"timeouts",{"script":185000}] 03:22:54 INFO - PROCESS | 3752 | 1483615374021 Marionette TRACE conn4 <- [1,234,null,{}] 03:22:54 INFO - PROCESS | 3752 | 1483615374025 Marionette TRACE conn4 -> [0,235,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:54 INFO - PROCESS | 3752 | 1483615374121 Marionette TRACE conn4 <- [1,235,null,{"value":null}] 03:22:54 INFO - PROCESS | 3752 | 1483615374186 Marionette TRACE conn4 -> [0,236,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/sign_verify/test_rsa_pkcs.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/sign_verify/test_rsa_pkcs.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:54 INFO - PROCESS | 3752 | ++DOCSHELL 0FB02C00 == 22 [pid = 3752] [id = 67] 03:22:54 INFO - PROCESS | 3752 | ++DOMWINDOW == 41 (0FB0A400) [pid = 3752] [serial = 202] [outer = 00000000] 03:22:54 INFO - PROCESS | 3752 | ++DOMWINDOW == 42 (11AF8400) [pid = 3752] [serial = 203] [outer = 0FB0A400] 03:22:54 INFO - PROCESS | 3752 | 1483615374246 Marionette DEBUG loaded listener.js 03:22:54 INFO - PROCESS | 3752 | ++DOMWINDOW == 43 (1129C800) [pid = 3752] [serial = 204] [outer = 0FB0A400] 03:22:54 INFO - PROCESS | 3752 | 1483615374898 Marionette TRACE conn4 <- [1,236,null,{"value":["/WebCryptoAPI/sign_verify/test_rsa_pkcs.html",0,null,null,[["RSASSA-PKCS1-v1_5 with SHA-1 verification",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-256 verification",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-384 verification",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-512 verification",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-1 verification with altered signature after call",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-256 verification with altered signature after call",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-384 verification with altered signature after call",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-512 verification with altered signature after call",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-1 with altered plaintext after call",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-256 with altered plaintext after call",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-384 with altered plaintext after call",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-512 with altered plaintext after call",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-1 using privateKey to verify",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-256 using privateKey to verify",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-384 using privateKey to verify",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-512 using privateKey to verify",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-1 using publicKey to sign",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-256 using publicKey to sign",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-384 using publicKey to sign",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-512 using publicKey to sign",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-1 no verify usage",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-256 no verify usage",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-384 no verify usage",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-512 no verify usage",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-1 round trip",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-256 round trip",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-384 round trip",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-512 round trip",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-1 signing with wrong algorithm name",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-256 signing with wrong algorithm name",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-384 signing with wrong algorithm name",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-512 signing with wrong algorithm name",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-1 verification with wrong algorithm name",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-256 verification with wrong algorithm name",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-384 verification with wrong algorithm name",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-512 verification with wrong algorithm name",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered signature",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered signature",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered signature",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered signature",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered plaintext",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered plaintext",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered plaintext",0,null,null],["RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered plaintext",0,null,null]]]}] 03:22:54 INFO - ............................................ 03:22:54 INFO - TEST-OK | /WebCryptoAPI/sign_verify/test_rsa_pkcs.html | took 904ms 03:22:54 INFO - PROCESS | 3752 | 1483615374930 Marionette TRACE conn4 -> [0,237,"getWindowHandle",null] 03:22:54 INFO - PROCESS | 3752 | 1483615374932 Marionette TRACE conn4 <- [1,237,null,{"value":"12"}] 03:22:54 INFO - TEST-START | /WebCryptoAPI/sign_verify/test_rsa_pss.html 03:22:54 INFO - PROCESS | 3752 | 1483615374937 Marionette TRACE conn4 -> [0,238,"timeouts",{"script":185000}] 03:22:54 INFO - PROCESS | 3752 | 1483615374939 Marionette TRACE conn4 <- [1,238,null,{}] 03:22:54 INFO - PROCESS | 3752 | 1483615374943 Marionette TRACE conn4 -> [0,239,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:55 INFO - PROCESS | 3752 | 1483615375059 Marionette TRACE conn4 <- [1,239,null,{"value":null}] 03:22:55 INFO - PROCESS | 3752 | 1483615375123 Marionette TRACE conn4 -> [0,240,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/sign_verify/test_rsa_pss.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/sign_verify/test_rsa_pss.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:55 INFO - PROCESS | 3752 | ++DOCSHELL 1921F400 == 23 [pid = 3752] [id = 68] 03:22:55 INFO - PROCESS | 3752 | ++DOMWINDOW == 44 (19223400) [pid = 3752] [serial = 205] [outer = 00000000] 03:22:55 INFO - PROCESS | 3752 | ++DOMWINDOW == 45 (194C5C00) [pid = 3752] [serial = 206] [outer = 19223400] 03:22:55 INFO - PROCESS | 3752 | 1483615375180 Marionette DEBUG loaded listener.js 03:22:55 INFO - PROCESS | 3752 | ++DOMWINDOW == 46 (19ABC400) [pid = 3752] [serial = 207] [outer = 19223400] 03:22:55 INFO - PROCESS | 3752 | --DOCSHELL 12B2C000 == 22 [pid = 3752] [id = 48] 03:22:56 INFO - PROCESS | 3752 | --DOMWINDOW == 45 (16986400) [pid = 3752] [serial = 168] [outer = 00000000] [url = about:blank] 03:22:56 INFO - PROCESS | 3752 | --DOMWINDOW == 44 (111D3C00) [pid = 3752] [serial = 171] [outer = 00000000] [url = about:blank] 03:22:56 INFO - PROCESS | 3752 | --DOMWINDOW == 43 (188F1000) [pid = 3752] [serial = 182] [outer = 00000000] [url = about:blank] 03:22:56 INFO - PROCESS | 3752 | --DOMWINDOW == 42 (188F5400) [pid = 3752] [serial = 183] [outer = 00000000] [url = about:blank] 03:22:56 INFO - PROCESS | 3752 | --DOMWINDOW == 41 (1441D400) [pid = 3752] [serial = 177] [outer = 00000000] [url = about:blank] 03:22:56 INFO - PROCESS | 3752 | --DOMWINDOW == 40 (17A6BC00) [pid = 3752] [serial = 180] [outer = 00000000] [url = about:blank] 03:22:56 INFO - PROCESS | 3752 | --DOMWINDOW == 39 (17A6EC00) [pid = 3752] [serial = 179] [outer = 00000000] [url = about:blank] 03:22:56 INFO - PROCESS | 3752 | --DOMWINDOW == 38 (14B67000) [pid = 3752] [serial = 176] [outer = 00000000] [url = about:blank] 03:22:56 INFO - PROCESS | 3752 | --DOMWINDOW == 37 (12DE0400) [pid = 3752] [serial = 173] [outer = 00000000] [url = about:blank] 03:22:56 INFO - PROCESS | 3752 | --DOMWINDOW == 36 (1110AC00) [pid = 3752] [serial = 170] [outer = 00000000] [url = about:blank] 03:22:56 INFO - PROCESS | 3752 | --DOMWINDOW == 35 (18B76800) [pid = 3752] [serial = 185] [outer = 00000000] [url = about:blank] 03:22:56 INFO - PROCESS | 3752 | --DOMWINDOW == 34 (12DE9C00) [pid = 3752] [serial = 174] [outer = 00000000] [url = about:blank] 03:22:57 INFO - PROCESS | 3752 | 1483615377163 Marionette TRACE conn4 <- [1,240,null,{"value":["/WebCryptoAPI/sign_verify/test_rsa_pss.html",0,null,null,[["RSA-PSS with SHA-1 and no salt verification",0,null,null],["RSA-PSS with SHA-256 and no salt verification",0,null,null],["RSA-PSS with SHA-384 and no salt verification",0,null,null],["RSA-PSS with SHA-512 and no salt verification",0,null,null],["RSA-PSS with SHA-1, salted verification",0,null,null],["RSA-PSS with SHA-256, salted verification",0,null,null],["RSA-PSS with SHA-384, salted verification",0,null,null],["RSA-PSS with SHA-512, salted verification",0,null,null],["RSA-PSS with SHA-1 and no salt verification with altered signature after call",0,null,null],["RSA-PSS with SHA-256 and no salt verification with altered signature after call",0,null,null],["RSA-PSS with SHA-384 and no salt verification with altered signature after call",0,null,null],["RSA-PSS with SHA-512 and no salt verification with altered signature after call",0,null,null],["RSA-PSS with SHA-1, salted verification with altered signature after call",0,null,null],["RSA-PSS with SHA-256, salted verification with altered signature after call",0,null,null],["RSA-PSS with SHA-384, salted verification with altered signature after call",0,null,null],["RSA-PSS with SHA-512, salted verification with altered signature after call",0,null,null],["RSA-PSS with SHA-1 and no salt with altered plaintext after call",0,null,null],["RSA-PSS with SHA-256 and no salt with altered plaintext after call",0,null,null],["RSA-PSS with SHA-384 and no salt with altered plaintext after call",0,null,null],["RSA-PSS with SHA-512 and no salt with altered plaintext after call",0,null,null],["RSA-PSS with SHA-1, salted with altered plaintext after call",0,null,null],["RSA-PSS with SHA-256, salted with altered plaintext after call",0,null,null],["RSA-PSS with SHA-384, salted with altered plaintext after call",0,null,null],["RSA-PSS with SHA-512, salted with altered plaintext after call",0,null,null],["RSA-PSS with SHA-1 and no salt using privateKey to verify",0,null,null],["RSA-PSS with SHA-256 and no salt using privateKey to verify",0,null,null],["RSA-PSS with SHA-384 and no salt using privateKey to verify",0,null,null],["RSA-PSS with SHA-512 and no salt using privateKey to verify",0,null,null],["RSA-PSS with SHA-1, salted using privateKey to verify",0,null,null],["RSA-PSS with SHA-256, salted using privateKey to verify",0,null,null],["RSA-PSS with SHA-384, salted using privateKey to verify",0,null,null],["RSA-PSS with SHA-512, salted using privateKey to verify",0,null,null],["RSA-PSS with SHA-1 and no salt using publicKey to sign",0,null,null],["RSA-PSS with SHA-256 and no salt using publicKey to sign",0,null,null],["RSA-PSS with SHA-384 and no salt using publicKey to sign",0,null,null],["RSA-PSS with SHA-512 and no salt using publicKey to sign",0,null,null],["RSA-PSS with SHA-1, salted using publicKey to sign",0,null,null],["RSA-PSS with SHA-256, salted using publicKey to sign",0,null,null],["RSA-PSS with SHA-384, salted using publicKey to sign",0,null,null],["RSA-PSS with SHA-512, salted using publicKey to sign",0,null,null],["RSA-PSS with SHA-1 and no salt no verify usage",0,null,null],["RSA-PSS with SHA-256 and no salt no verify usage",0,null,null],["RSA-PSS with SHA-384 and no salt no verify usage",0,null,null],["RSA-PSS with SHA-512 and no salt no verify usage",0,null,null],["RSA-PSS with SHA-1, salted no verify usage",0,null,null],["RSA-PSS with SHA-256, salted no verify usage",0,null,null],["RSA-PSS with SHA-384, salted no verify usage",0,null,null],["RSA-PSS with SHA-512, salted no verify usage",0,null,null],["RSA-PSS with SHA-1 and no salt round trip",0,null,null],["RSA-PSS with SHA-256 and no salt round trip",0,null,null],["RSA-PSS with SHA-384 and no salt round trip",0,null,null],["RSA-PSS with SHA-512 and no salt round trip",0,null,null],["RSA-PSS with SHA-1, salted round trip",0,null,null],["RSA-PSS with SHA-256, salted round trip",0,null,null],["RSA-PSS with SHA-384, salted round trip",0,null,null],["RSA-PSS with SHA-512, salted round trip",0,null,null],["RSA-PSS with SHA-1 and no salt signing with wrong algorithm name",0,null,null],["RSA-PSS with SHA-256 and no salt signing with wrong algorithm name",0,null,null],["RSA-PSS with SHA-384 and no salt signing with wrong algorithm name",0,null,null],["RSA-PSS with SHA-512 and no salt signing with wrong algorithm name",0,null,null],["RSA-PSS with SHA-1, salted signing with wrong algorithm name",0,null,null],["RSA-PSS with SHA-256, salted signing with wrong algorithm name",0,null,null],["RSA-PSS with SHA-384, salted signing with wrong algorithm name",0,null,null],["RSA-PSS with SHA-512, salted signing with wrong algorithm name",0,null,null],["RSA-PSS with SHA-1 and no salt verification with wrong algorithm name",0,null,null],["RSA-PSS with SHA-256 and no salt verification with wrong algorithm name",0,null,null],["RSA-PSS with SHA-384 and no salt verification with wrong algorithm name",0,null,null],["RSA-PSS with SHA-512 and no salt verification with wrong algorithm name",0,null,null],["RSA-PSS with SHA-1, salted verification with wrong algorithm name",0,null,null],["RSA-PSS with SHA-256, salted verification with wrong algorithm name",0,null,null],["RSA-PSS with SHA-384, salted verification with wrong algorithm name",0,null,null],["RSA-PSS with SHA-512, salted verification with wrong algorithm name",0,null,null],["RSA-PSS with SHA-1 and no salt verification failure with altered signature",0,null,null],["RSA-PSS with SHA-256 and no salt verification failure with altered signature",0,null,null],["RSA-PSS with SHA-384 and no salt verification failure with altered signature",0,null,null],["RSA-PSS with SHA-512 and no salt verification failure with altered signature",0,null,null],["RSA-PSS with SHA-1, salted verification failure with altered signature",0,null,null],["RSA-PSS with SHA-256, salted verification failure with altered signature",0,null,null],["RSA-PSS with SHA-384, salted verification failure with altered signature",0,null,null],["RSA-PSS with SHA-512, salted verification failure with altered signature",0,null,null],["RSA-PSS with SHA-1 and no salt verification failure with altered plaintext",0,null,null],["RSA-PSS with SHA-256 and no salt verification failure with altered plaintext",0,null,null],["RSA-PSS with SHA-384 and no salt verification failure with altered plaintext",0,null,null],["RSA-PSS with SHA-512 and no salt verification failure with altered plaintext",0,null,null],["RSA-PSS with SHA-1, salted verification failure with altered plaintext",0,null,null],["RSA-PSS with SHA-256, salted verification failure with altered plaintext",0,null,null],["RSA-PSS with SHA-384, salted verification failure with altered plaintext",0,null,null],["RSA-PSS with SHA-512, salted verification failure with altered plaintext",0,null,null]]]}] 03:22:57 INFO - ........................................................................................ 03:22:57 INFO - TEST-OK | /WebCryptoAPI/sign_verify/test_rsa_pss.html | took 2275ms 03:22:57 INFO - PROCESS | 3752 | 1483615377234 Marionette TRACE conn4 -> [0,241,"getWindowHandle",null] 03:22:57 INFO - PROCESS | 3752 | 1483615377240 Marionette TRACE conn4 <- [1,241,null,{"value":"12"}] 03:22:57 INFO - TEST-START | /WebIDL/ecmascript-binding/es-exceptions/DOMException-constants.html 03:22:57 INFO - PROCESS | 3752 | 1483615377246 Marionette TRACE conn4 -> [0,242,"timeouts",{"script":35000}] 03:22:57 INFO - PROCESS | 3752 | 1483615377250 Marionette TRACE conn4 <- [1,242,null,{}] 03:22:57 INFO - PROCESS | 3752 | 1483615377258 Marionette TRACE conn4 -> [0,243,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:57 INFO - PROCESS | 3752 | 1483615377391 Marionette TRACE conn4 <- [1,243,null,{"value":null}] 03:22:57 INFO - PROCESS | 3752 | 1483615377450 Marionette TRACE conn4 -> [0,244,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebIDL/ecmascript-binding/es-exceptions/DOMException-constants.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/DOMException-constants.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:57 INFO - PROCESS | 3752 | ++DOCSHELL 11B91C00 == 23 [pid = 3752] [id = 69] 03:22:57 INFO - PROCESS | 3752 | ++DOMWINDOW == 35 (11B94000) [pid = 3752] [serial = 208] [outer = 00000000] 03:22:57 INFO - PROCESS | 3752 | ++DOMWINDOW == 36 (11E29400) [pid = 3752] [serial = 209] [outer = 11B94000] 03:22:57 INFO - PROCESS | 3752 | 1483615377542 Marionette DEBUG loaded listener.js 03:22:57 INFO - PROCESS | 3752 | ++DOMWINDOW == 37 (11E61C00) [pid = 3752] [serial = 210] [outer = 11B94000] 03:22:57 INFO - PROCESS | 3752 | 1483615377959 Marionette TRACE conn4 <- [1,244,null,{"value":["/WebIDL/ecmascript-binding/es-exceptions/DOMException-constants.html",0,null,null,[["DOMException constants",0,null,null],["Constant INDEX_SIZE_ERR on DOMException constructor object",0,null,null],["Constant INDEX_SIZE_ERR on DOMException prototype object",0,null,null],["Constant DOMSTRING_SIZE_ERR on DOMException constructor object",0,null,null],["Constant DOMSTRING_SIZE_ERR on DOMException prototype object",0,null,null],["Constant HIERARCHY_REQUEST_ERR on DOMException constructor object",0,null,null],["Constant HIERARCHY_REQUEST_ERR on DOMException prototype object",0,null,null],["Constant WRONG_DOCUMENT_ERR on DOMException constructor object",0,null,null],["Constant WRONG_DOCUMENT_ERR on DOMException prototype object",0,null,null],["Constant INVALID_CHARACTER_ERR on DOMException constructor object",0,null,null],["Constant INVALID_CHARACTER_ERR on DOMException prototype object",0,null,null],["Constant NO_DATA_ALLOWED_ERR on DOMException constructor object",0,null,null],["Constant NO_DATA_ALLOWED_ERR on DOMException prototype object",0,null,null],["Constant NO_MODIFICATION_ALLOWED_ERR on DOMException constructor object",0,null,null],["Constant NO_MODIFICATION_ALLOWED_ERR on DOMException prototype object",0,null,null],["Constant NOT_FOUND_ERR on DOMException constructor object",0,null,null],["Constant NOT_FOUND_ERR on DOMException prototype object",0,null,null],["Constant NOT_SUPPORTED_ERR on DOMException constructor object",0,null,null],["Constant NOT_SUPPORTED_ERR on DOMException prototype object",0,null,null],["Constant INUSE_ATTRIBUTE_ERR on DOMException constructor object",0,null,null],["Constant INUSE_ATTRIBUTE_ERR on DOMException prototype object",0,null,null],["Constant INVALID_STATE_ERR on DOMException constructor object",0,null,null],["Constant INVALID_STATE_ERR on DOMException prototype object",0,null,null],["Constant SYNTAX_ERR on DOMException constructor object",0,null,null],["Constant SYNTAX_ERR on DOMException prototype object",0,null,null],["Constant INVALID_MODIFICATION_ERR on DOMException constructor object",0,null,null],["Constant INVALID_MODIFICATION_ERR on DOMException prototype object",0,null,null],["Constant NAMESPACE_ERR on DOMException constructor object",0,null,null],["Constant NAMESPACE_ERR on DOMException prototype object",0,null,null],["Constant INVALID_ACCESS_ERR on DOMException constructor object",0,null,null],["Constant INVALID_ACCESS_ERR on DOMException prototype object",0,null,null],["Constant VALIDATION_ERR on DOMException constructor object",0,null,null],["Constant VALIDATION_ERR on DOMException prototype object",0,null,null],["Constant TYPE_MISMATCH_ERR on DOMException constructor object",0,null,null],["Constant TYPE_MISMATCH_ERR on DOMException prototype object",0,null,null],["Constant SECURITY_ERR on DOMException constructor object",0,null,null],["Constant SECURITY_ERR on DOMException prototype object",0,null,null],["Constant NETWORK_ERR on DOMException constructor object",0,null,null],["Constant NETWORK_ERR on DOMException prototype object",0,null,null],["Constant ABORT_ERR on DOMException constructor object",0,null,null],["Constant ABORT_ERR on DOMException prototype object",0,null,null],["Constant URL_MISMATCH_ERR on DOMException constructor object",0,null,null],["Constant URL_MISMATCH_ERR on DOMException prototype object",0,null,null],["Constant QUOTA_EXCEEDED_ERR on DOMException constructor object",0,null,null],["Constant QUOTA_EXCEEDED_ERR on DOMException prototype object",0,null,null],["Constant TIMEOUT_ERR on DOMException constructor object",0,null,null],["Constant TIMEOUT_ERR on DOMException prototype object",0,null,null],["Constant INVALID_NODE_TYPE_ERR on DOMException constructor object",0,null,null],["Constant INVALID_NODE_TYPE_ERR on DOMException prototype object",0,null,null],["Constant DATA_CLONE_ERR on DOMException constructor object",0,null,null],["Constant DATA_CLONE_ERR on DOMException prototype object",0,null,null]]]}] 03:22:57 INFO - ................................................... 03:22:57 INFO - TEST-OK | /WebIDL/ecmascript-binding/es-exceptions/DOMException-constants.html | took 780ms 03:22:58 INFO - PROCESS | 3752 | 1483615378007 Marionette TRACE conn4 -> [0,245,"getWindowHandle",null] 03:22:58 INFO - PROCESS | 3752 | 1483615378014 Marionette TRACE conn4 <- [1,245,null,{"value":"12"}] 03:22:58 INFO - TEST-START | /WebIDL/ecmascript-binding/es-exceptions/DOMException-constructor.html 03:22:58 INFO - PROCESS | 3752 | 1483615378021 Marionette TRACE conn4 -> [0,246,"timeouts",{"script":35000}] 03:22:58 INFO - PROCESS | 3752 | 1483615378025 Marionette TRACE conn4 <- [1,246,null,{}] 03:22:58 INFO - PROCESS | 3752 | 1483615378030 Marionette TRACE conn4 -> [0,247,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:58 INFO - PROCESS | 3752 | 1483615378136 Marionette TRACE conn4 <- [1,247,null,{"value":null}] 03:22:58 INFO - PROCESS | 3752 | 1483615378143 Marionette TRACE conn4 -> [0,248,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebIDL/ecmascript-binding/es-exceptions/DOMException-constructor.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/DOMException-constructor.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:58 INFO - PROCESS | 3752 | ++DOCSHELL 12BF4800 == 24 [pid = 3752] [id = 70] 03:22:58 INFO - PROCESS | 3752 | ++DOMWINDOW == 38 (12BF6000) [pid = 3752] [serial = 211] [outer = 00000000] 03:22:58 INFO - PROCESS | 3752 | ++DOMWINDOW == 39 (13D83C00) [pid = 3752] [serial = 212] [outer = 12BF6000] 03:22:58 INFO - PROCESS | 3752 | 1483615378202 Marionette DEBUG loaded listener.js 03:22:58 INFO - PROCESS | 3752 | ++DOMWINDOW == 40 (13FEB000) [pid = 3752] [serial = 213] [outer = 12BF6000] 03:22:58 INFO - PROCESS | 3752 | 1483615378636 Marionette TRACE conn4 <- [1,248,null,{"value":["/WebIDL/ecmascript-binding/es-exceptions/DOMException-constructor.html",0,null,null,[["new DOMException()",0,null,null],["new DOMException(): own-ness",0,null,null],["new DOMException(null)",0,null,null],["new DOMException(undefined)",0,null,null],["new DOMException(undefined): own-ness",0,null,null],["new DOMException(\"foo\")",0,null,null],["new DOMException(\"foo\"): own-ness",1,"assert_true: The message property should be own expected true got false","@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/DOMException-constructor.html:62:3\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\n@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/DOMException-constructor.html:58:1\n"],["new DOMException(\"bar\", undefined)",0,null,null],["new DOMException(\"bar\", \"NotSupportedError\")",0,null,null],["new DOMException(\"bar\", \"NotSupportedError\"): own-ness",1,"assert_true: The name property should be own expected true got false","@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/DOMException-constructor.html:83:3\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\n@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/DOMException-constructor.html:81:1\n"],["new DOMException(\"bar\", \"foo\")",0,null,null],["new DOMexception(\"msg\", \"IndexSizeError\")",0,null,null],["new DOMexception(\"msg\", \"HierarchyRequestError\")",0,null,null],["new DOMexception(\"msg\", \"WrongDocumentError\")",0,null,null],["new DOMexception(\"msg\", \"InvalidCharacterError\")",0,null,null],["new DOMexception(\"msg\", \"NoModificationAllowedError\")",0,null,null],["new DOMexception(\"msg\", \"NotFoundError\")",0,null,null],["new DOMexception(\"msg\", \"NotSupportedError\")",0,null,null],["new DOMexception(\"msg\", \"InUseAttributeError\")",0,null,null],["new DOMexception(\"msg\", \"InvalidStateError\")",0,null,null],["new DOMexception(\"msg\", \"SyntaxError\")",0,null,null],["new DOMexception(\"msg\", \"InvalidModificationError\")",0,null,null],["new DOMexception(\"msg\", \"NamespaceError\")",0,null,null],["new DOMexception(\"msg\", \"InvalidAccessError\")",0,null,null],["new DOMexception(\"msg\", \"SecurityError\")",0,null,null],["new DOMexception(\"msg\", \"NetworkError\")",0,null,null],["new DOMexception(\"msg\", \"AbortError\")",0,null,null],["new DOMexception(\"msg\", \"URLMismatchError\")",0,null,null],["new DOMexception(\"msg\", \"QuotaExceededError\")",0,null,null],["new DOMexception(\"msg\", \"TimeoutError\")",0,null,null],["new DOMexception(\"msg\", \"InvalidNodeTypeError\")",0,null,null],["new DOMexception(\"msg\", \"DataCloneError\")",0,null,null],["new DOMException(\"bar\", \"UnknownError\")",0,null,null]]]}] 03:22:58 INFO - ................................. 03:22:58 INFO - TEST-OK | /WebIDL/ecmascript-binding/es-exceptions/DOMException-constructor.html | took 655ms 03:22:58 INFO - PROCESS | 3752 | 1483615378672 Marionette TRACE conn4 -> [0,249,"getWindowHandle",null] 03:22:58 INFO - PROCESS | 3752 | 1483615378675 Marionette TRACE conn4 <- [1,249,null,{"value":"12"}] 03:22:58 INFO - TEST-START | /WebIDL/ecmascript-binding/es-exceptions/constructor-object.html 03:22:58 INFO - PROCESS | 3752 | 1483615378680 Marionette TRACE conn4 -> [0,250,"timeouts",{"script":35000}] 03:22:58 INFO - PROCESS | 3752 | 1483615378685 Marionette TRACE conn4 <- [1,250,null,{}] 03:22:58 INFO - PROCESS | 3752 | 1483615378698 Marionette TRACE conn4 -> [0,251,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:58 INFO - PROCESS | 3752 | 1483615378824 Marionette TRACE conn4 <- [1,251,null,{"value":null}] 03:22:58 INFO - PROCESS | 3752 | 1483615378833 Marionette TRACE conn4 -> [0,252,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebIDL/ecmascript-binding/es-exceptions/constructor-object.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/constructor-object.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:58 INFO - PROCESS | 3752 | ++DOCSHELL 140E5400 == 25 [pid = 3752] [id = 71] 03:22:58 INFO - PROCESS | 3752 | ++DOMWINDOW == 41 (140E6000) [pid = 3752] [serial = 214] [outer = 00000000] 03:22:58 INFO - PROCESS | 3752 | ++DOMWINDOW == 42 (15E78400) [pid = 3752] [serial = 215] [outer = 140E6000] 03:22:58 INFO - PROCESS | 3752 | 1483615378895 Marionette DEBUG loaded listener.js 03:22:58 INFO - PROCESS | 3752 | ++DOMWINDOW == 43 (14BBA000) [pid = 3752] [serial = 216] [outer = 140E6000] 03:22:59 INFO - PROCESS | 3752 | 1483615379239 Marionette TRACE conn4 <- [1,252,null,{"value":["/WebIDL/ecmascript-binding/es-exceptions/constructor-object.html",0,null,null,[["existence and properties of DOMException",1,"assert_equals: prototype of self's property \"DOMException\" is not Error expected function \"function Error() {\n [native code]\n}\" but got function \"function () {\n}\"","run_test/<@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/constructor-object.js:20:9\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nrun_test@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/constructor-object.js:2:5\n@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/constructor-object.html:10:1\n"],["existence and properties of DOMException.prototype",0,null,null],["existence of name and code properties on DOMException.prototype",1,"assert_false: DOMException.prototype should not have an own \"name\" property. expected false got true","run_test/<@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/constructor-object.js:80:9\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nrun_test@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/constructor-object.js:79:5\n@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/constructor-object.html:10:1\n"],["existence and properties of exception interface prototype object's \"constructor\" property",0,null,null]]]}] 03:22:59 INFO - .... 03:22:59 INFO - TEST-OK | /WebIDL/ecmascript-binding/es-exceptions/constructor-object.html | took 592ms 03:22:59 INFO - PROCESS | 3752 | 1483615379274 Marionette TRACE conn4 -> [0,253,"getWindowHandle",null] 03:22:59 INFO - PROCESS | 3752 | 1483615379278 Marionette TRACE conn4 <- [1,253,null,{"value":"12"}] 03:22:59 INFO - TEST-START | /WebIDL/ecmascript-binding/es-exceptions/constructor-object.worker 03:22:59 INFO - PROCESS | 3752 | 1483615379282 Marionette TRACE conn4 -> [0,254,"timeouts",{"script":35000}] 03:22:59 INFO - PROCESS | 3752 | 1483615379285 Marionette TRACE conn4 <- [1,254,null,{}] 03:22:59 INFO - PROCESS | 3752 | 1483615379289 Marionette TRACE conn4 -> [0,255,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:22:59 INFO - PROCESS | 3752 | 1483615379385 Marionette TRACE conn4 <- [1,255,null,{"value":null}] 03:22:59 INFO - PROCESS | 3752 | 1483615379452 Marionette TRACE conn4 -> [0,256,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebIDL/ecmascript-binding/es-exceptions/constructor-object.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/constructor-object.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:22:59 INFO - PROCESS | 3752 | ++DOCSHELL 15F64800 == 26 [pid = 3752] [id = 72] 03:22:59 INFO - PROCESS | 3752 | ++DOMWINDOW == 44 (15F6B800) [pid = 3752] [serial = 217] [outer = 00000000] 03:22:59 INFO - PROCESS | 3752 | ++DOMWINDOW == 45 (1665C400) [pid = 3752] [serial = 218] [outer = 15F6B800] 03:22:59 INFO - PROCESS | 3752 | 1483615379507 Marionette DEBUG loaded listener.js 03:22:59 INFO - PROCESS | 3752 | ++DOMWINDOW == 46 (16783C00) [pid = 3752] [serial = 219] [outer = 15F6B800] 03:22:59 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:22:59 INFO - PROCESS | 3752 | 1483615379884 Marionette TRACE conn4 <- [1,256,null,{"value":["/WebIDL/ecmascript-binding/es-exceptions/constructor-object.worker",0,null,null,[["existence and properties of DOMException",1,"assert_equals: prototype of self's property \"DOMException\" is not Error expected function \"function Error() {\n [native code]\n}\" but got function \"function () {\n}\"","run_test/<@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/constructor-object.js:20:9\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nrun_test@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/constructor-object.js:2:5\n@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/constructor-object.worker.js:3:1\n"],["existence and properties of DOMException.prototype",0,{},{}],["existence of name and code properties on DOMException.prototype",1,"assert_false: DOMException.prototype should not have an own \"name\" property. expected false got true","run_test/<@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/constructor-object.js:80:9\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nrun_test@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/constructor-object.js:79:5\n@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/constructor-object.worker.js:3:1\n"],["existence and properties of exception interface prototype object's \"constructor\" property",0,{},{}]]]}] 03:22:59 INFO - .... 03:22:59 INFO - TEST-OK | /WebIDL/ecmascript-binding/es-exceptions/constructor-object.worker | took 624ms 03:22:59 INFO - TEST-START | /WebIDL/ecmascript-binding/es-exceptions/exceptions.html 03:22:59 INFO - PROCESS | 3752 | 1483615379919 Marionette TRACE conn4 -> [0,257,"getWindowHandle",null] 03:22:59 INFO - PROCESS | 3752 | 1483615379921 Marionette TRACE conn4 <- [1,257,null,{"value":"12"}] 03:22:59 INFO - PROCESS | 3752 | 1483615379925 Marionette TRACE conn4 -> [0,258,"timeouts",{"script":35000}] 03:22:59 INFO - PROCESS | 3752 | 1483615379927 Marionette TRACE conn4 <- [1,258,null,{}] 03:22:59 INFO - PROCESS | 3752 | 1483615379931 Marionette TRACE conn4 -> [0,259,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:00 INFO - PROCESS | 3752 | 1483615380044 Marionette TRACE conn4 <- [1,259,null,{"value":null}] 03:23:00 INFO - PROCESS | 3752 | 1483615380051 Marionette TRACE conn4 -> [0,260,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebIDL/ecmascript-binding/es-exceptions/exceptions.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:00 INFO - PROCESS | 3752 | ++DOCSHELL 168B8000 == 27 [pid = 3752] [id = 73] 03:23:00 INFO - PROCESS | 3752 | ++DOMWINDOW == 47 (1698F400) [pid = 3752] [serial = 220] [outer = 00000000] 03:23:00 INFO - PROCESS | 3752 | ++DOMWINDOW == 48 (16FA2400) [pid = 3752] [serial = 221] [outer = 1698F400] 03:23:00 INFO - PROCESS | 3752 | 1483615380105 Marionette DEBUG loaded listener.js 03:23:00 INFO - PROCESS | 3752 | ++DOMWINDOW == 49 (16DD8400) [pid = 3752] [serial = 222] [outer = 1698F400] 03:23:00 INFO - PROCESS | 3752 | ++DOCSHELL 17AE2000 == 28 [pid = 3752] [id = 74] 03:23:00 INFO - PROCESS | 3752 | ++DOMWINDOW == 50 (17AE2400) [pid = 3752] [serial = 223] [outer = 00000000] 03:23:00 INFO - PROCESS | 3752 | ++DOMWINDOW == 51 (17AE3400) [pid = 3752] [serial = 224] [outer = 17AE2400] 03:23:00 INFO - PROCESS | 3752 | 1483615380597 Marionette TRACE conn4 <- [1,260,null,{"value":["/WebIDL/ecmascript-binding/es-exceptions/exceptions.html",0,null,null,[["Object.getPrototypeOf(exception) === DOMException.prototype",0,null,null],["exception.hasOwnProperty(\"name\")",1,"assert_true: expected true got false","testException/<@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:37:5\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\ntestException@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:36:3\n@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:118:1\n"],["exception.name === \"HierarchyRequestError\"",0,null,null],["Object.getOwnPropertyDescriptor(exception, \"name\")",1,"desc is undefined","testException/<@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:46:5\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\ntestException@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:44:3\n@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:118:1\n"],["Object.getOwnPropertyDescriptor(exception, \"message\")",0,null,null],["typeof exception.message === \"string\"",1,"assert_equals: expected \"\" but got \"Node cannot be inserted at the specified point in the hierarchy\"","testException/<@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:77:7\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\ntestException@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:71:3\n@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:118:1\n"],["Object.prototype.toString.call(exception) === \"[object DOMException]\"",0,null,null],["exception.code === DOMException.HIERARCHY_REQUEST_ERR",0,null,null],["Object.getOwnPropertyDescriptor(exception, \"code\")",1,"desc is undefined","testException/<@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:102:5\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\ntestException@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:100:3\n@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:118:1\n"],["In iframe: Object.getPrototypeOf(exception) === DOMException.prototype",0,null,null],["In iframe: exception.hasOwnProperty(\"name\")",1,"assert_true: expected true got false","testException/<@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:37:5\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\ntestException@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:36:3\niframe.onload@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:130:3\n"],["In iframe: exception.name === \"HierarchyRequestError\"",0,null,null],["In iframe: Object.getOwnPropertyDescriptor(exception, \"name\")",1,"desc is undefined","testException/<@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:46:5\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\ntestException@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:44:3\niframe.onload@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:130:3\n"],["In iframe: Object.getOwnPropertyDescriptor(exception, \"message\")",0,null,null],["In iframe: typeof exception.message === \"string\"",1,"assert_equals: expected \"\" but got \"Node cannot be inserted at the specified point in the hierarchy\"","testException/<@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:77:7\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\ntestException@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:71:3\niframe.onload@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:130:3\n"],["In iframe: Object.prototype.toString.call(exception) === \"[object DOMException]\"",0,null,null],["In iframe: exception.code === DOMException.HIERARCHY_REQUEST_ERR",0,null,null],["In iframe: Object.getOwnPropertyDescriptor(exception, \"code\")",1,"desc is undefined","testException/<@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:102:5\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\ntestException@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:100:3\niframe.onload@http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html:130:3\n"]]]}] 03:23:00 INFO - .................. 03:23:00 INFO - TEST-OK | /WebIDL/ecmascript-binding/es-exceptions/exceptions.html | took 702ms 03:23:00 INFO - PROCESS | 3752 | 1483615380644 Marionette TRACE conn4 -> [0,261,"getWindowHandle",null] 03:23:00 INFO - PROCESS | 3752 | 1483615380648 Marionette TRACE conn4 <- [1,261,null,{"value":"12"}] 03:23:00 INFO - TEST-START | /WebIDL/ecmascript-binding/has-instance.html 03:23:00 INFO - PROCESS | 3752 | 1483615380652 Marionette TRACE conn4 -> [0,262,"timeouts",{"script":35000}] 03:23:00 INFO - PROCESS | 3752 | 1483615380654 Marionette TRACE conn4 <- [1,262,null,{}] 03:23:00 INFO - PROCESS | 3752 | 1483615380657 Marionette TRACE conn4 -> [0,263,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:00 INFO - PROCESS | 3752 | 1483615380790 Marionette TRACE conn4 <- [1,263,null,{"value":null}] 03:23:00 INFO - PROCESS | 3752 | 1483615380795 Marionette TRACE conn4 -> [0,264,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebIDL/ecmascript-binding/has-instance.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebIDL/ecmascript-binding/has-instance.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:00 INFO - PROCESS | 3752 | ++DOCSHELL 17A63C00 == 29 [pid = 3752] [id = 75] 03:23:00 INFO - PROCESS | 3752 | ++DOMWINDOW == 52 (17A64800) [pid = 3752] [serial = 225] [outer = 00000000] 03:23:00 INFO - PROCESS | 3752 | ++DOMWINDOW == 53 (17CA3000) [pid = 3752] [serial = 226] [outer = 17A64800] 03:23:00 INFO - PROCESS | 3752 | 1483615380848 Marionette DEBUG loaded listener.js 03:23:00 INFO - PROCESS | 3752 | ++DOMWINDOW == 54 (17C9D800) [pid = 3752] [serial = 227] [outer = 17A64800] 03:23:01 INFO - PROCESS | 3752 | 1483615381210 Marionette TRACE conn4 <- [1,264,null,{"value":["/WebIDL/ecmascript-binding/has-instance.html",0,null,null,[["Manually-constructed prototype chains are correctly handled by instanceof",0,null,null]]]}] 03:23:01 INFO - . 03:23:01 INFO - TEST-OK | /WebIDL/ecmascript-binding/has-instance.html | took 592ms 03:23:01 INFO - PROCESS | 3752 | 1483615381247 Marionette TRACE conn4 -> [0,265,"getWindowHandle",null] 03:23:01 INFO - PROCESS | 3752 | 1483615381249 Marionette TRACE conn4 <- [1,265,null,{"value":"12"}] 03:23:01 INFO - TEST-START | /WebIDL/ecmascript-binding/interface-object.html 03:23:01 INFO - PROCESS | 3752 | 1483615381253 Marionette TRACE conn4 -> [0,266,"timeouts",{"script":35000}] 03:23:01 INFO - PROCESS | 3752 | 1483615381255 Marionette TRACE conn4 <- [1,266,null,{}] 03:23:01 INFO - PROCESS | 3752 | 1483615381259 Marionette TRACE conn4 -> [0,267,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:01 INFO - PROCESS | 3752 | 1483615381365 Marionette TRACE conn4 <- [1,267,null,{"value":null}] 03:23:01 INFO - PROCESS | 3752 | 1483615381370 Marionette TRACE conn4 -> [0,268,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebIDL/ecmascript-binding/interface-object.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebIDL/ecmascript-binding/interface-object.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:01 INFO - PROCESS | 3752 | ++DOCSHELL 1611B000 == 30 [pid = 3752] [id = 76] 03:23:01 INFO - PROCESS | 3752 | ++DOMWINDOW == 55 (17CA0C00) [pid = 3752] [serial = 228] [outer = 00000000] 03:23:01 INFO - PROCESS | 3752 | ++DOMWINDOW == 56 (184B6000) [pid = 3752] [serial = 229] [outer = 17CA0C00] 03:23:01 INFO - PROCESS | 3752 | 1483615381469 Marionette DEBUG loaded listener.js 03:23:01 INFO - PROCESS | 3752 | ++DOMWINDOW == 57 (184B7800) [pid = 3752] [serial = 230] [outer = 17CA0C00] 03:23:01 INFO - PROCESS | 3752 | 1483615381810 Marionette TRACE conn4 <- [1,268,null,{"value":["/WebIDL/ecmascript-binding/interface-object.html",0,null,null,[["An interface object deleted after it has been accessed is undefined",0,null,null],["An interface object deleted before it has been defined is undefined",0,null,null],["Interface objects deleted multiple times stay deleted",0,null,null],["Fancy property names don't break the resolve hook on Window",0,null,null]]]}] 03:23:01 INFO - .... 03:23:01 INFO - TEST-OK | /WebIDL/ecmascript-binding/interface-object.html | took 592ms 03:23:01 INFO - PROCESS | 3752 | 1483615381850 Marionette TRACE conn4 -> [0,269,"getWindowHandle",null] 03:23:01 INFO - PROCESS | 3752 | 1483615381853 Marionette TRACE conn4 <- [1,269,null,{"value":"12"}] 03:23:01 INFO - TEST-START | /XMLHttpRequest/FormData-append.html 03:23:01 INFO - PROCESS | 3752 | 1483615381857 Marionette TRACE conn4 -> [0,270,"timeouts",{"script":35000}] 03:23:01 INFO - PROCESS | 3752 | 1483615381858 Marionette TRACE conn4 <- [1,270,null,{}] 03:23:01 INFO - PROCESS | 3752 | 1483615381862 Marionette TRACE conn4 -> [0,271,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:02 INFO - PROCESS | 3752 | 1483615381998 Marionette TRACE conn4 <- [1,271,null,{"value":null}] 03:23:02 INFO - PROCESS | 3752 | 1483615382015 Marionette TRACE conn4 -> [0,272,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/FormData-append.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/FormData-append.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:02 INFO - PROCESS | 3752 | ++DOCSHELL 18691400 == 31 [pid = 3752] [id = 77] 03:23:02 INFO - PROCESS | 3752 | ++DOMWINDOW == 58 (18691800) [pid = 3752] [serial = 231] [outer = 00000000] 03:23:02 INFO - PROCESS | 3752 | ++DOMWINDOW == 59 (18699C00) [pid = 3752] [serial = 232] [outer = 18691800] 03:23:02 INFO - PROCESS | 3752 | 1483615382091 Marionette DEBUG loaded listener.js 03:23:02 INFO - PROCESS | 3752 | ++DOMWINDOW == 60 (11104800) [pid = 3752] [serial = 233] [outer = 18691800] 03:23:02 INFO - PROCESS | 3752 | --DOMWINDOW == 59 (13D81400) [pid = 3752] [serial = 190] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/sign_verify/rsa_pkcs.worker] 03:23:02 INFO - PROCESS | 3752 | --DOMWINDOW == 58 (140C0C00) [pid = 3752] [serial = 199] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/sign_verify/test_hmac.html] 03:23:02 INFO - PROCESS | 3752 | --DOMWINDOW == 57 (188F0000) [pid = 3752] [serial = 184] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/sign_verify/ecdsa.worker] 03:23:02 INFO - PROCESS | 3752 | --DOMWINDOW == 56 (0F696C00) [pid = 3752] [serial = 187] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/sign_verify/hmac.worker] 03:23:02 INFO - PROCESS | 3752 | --DOMWINDOW == 55 (0FB0A400) [pid = 3752] [serial = 202] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/sign_verify/test_rsa_pkcs.html] 03:23:02 INFO - PROCESS | 3752 | --DOMWINDOW == 54 (18435C00) [pid = 3752] [serial = 196] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/sign_verify/test_ecdsa.html] 03:23:02 INFO - PROCESS | 3752 | --DOMWINDOW == 53 (160D8000) [pid = 3752] [serial = 193] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/sign_verify/rsa_pss.worker] 03:23:02 INFO - PROCESS | 3752 | 1483615382484 Marionette TRACE conn4 <- [1,272,null,{"value":["/XMLHttpRequest/FormData-append.html",0,null,null,[["Passing a String object to FormData.append should work.",0,null,null],["testFormDataAppend1",0,null,null],["testFormDataAppend2",0,null,null],["testFormDataAppendUndefined1",0,null,null],["testFormDataAppendUndefined2",0,null,null],["testFormDataAppendNull1",0,null,null],["testFormDataAppendNull2",0,null,null],["testFormDataAppendToForm1",0,null,null],["testFormDataAppendToForm2",0,null,null],["testFormDataAppendToFormUndefined1",0,null,null],["testFormDataAppendToFormUndefined2",0,null,null],["testFormDataAppendToFormNull1",0,null,null],["testFormDataAppendToFormNull2",0,null,null],["testFormDataAppendEmptyBlob",0,null,null]]]}] 03:23:02 INFO - .............. 03:23:02 INFO - TEST-OK | /XMLHttpRequest/FormData-append.html | took 701ms 03:23:02 INFO - TEST-START | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.html 03:23:02 INFO - PROCESS | 3752 | 1483615382556 Marionette TRACE conn4 -> [0,273,"getWindowHandle",null] 03:23:02 INFO - PROCESS | 3752 | 1483615382559 Marionette TRACE conn4 <- [1,273,null,{"value":"12"}] 03:23:02 INFO - PROCESS | 3752 | 1483615382562 Marionette TRACE conn4 -> [0,274,"timeouts",{"script":35000}] 03:23:02 INFO - PROCESS | 3752 | 1483615382564 Marionette TRACE conn4 <- [1,274,null,{}] 03:23:02 INFO - PROCESS | 3752 | 1483615382567 Marionette TRACE conn4 -> [0,275,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:02 INFO - PROCESS | 3752 | 1483615382681 Marionette TRACE conn4 <- [1,275,null,{"value":null}] 03:23:02 INFO - PROCESS | 3752 | 1483615382719 Marionette TRACE conn4 -> [0,276,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:02 INFO - PROCESS | 3752 | ++DOCSHELL 140E0000 == 32 [pid = 3752] [id = 78] 03:23:02 INFO - PROCESS | 3752 | ++DOMWINDOW == 54 (1843A800) [pid = 3752] [serial = 234] [outer = 00000000] 03:23:02 INFO - PROCESS | 3752 | ++DOMWINDOW == 55 (18B79C00) [pid = 3752] [serial = 235] [outer = 1843A800] 03:23:02 INFO - PROCESS | 3752 | 1483615382799 Marionette DEBUG loaded listener.js 03:23:02 INFO - PROCESS | 3752 | ++DOMWINDOW == 56 (18B77000) [pid = 3752] [serial = 236] [outer = 1843A800] 03:23:02 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:23:04 INFO - PROCESS | 3752 | 1483615384093 Marionette TRACE conn4 <- [1,276,null,{"value":["/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html",0,null,null,[["default value is false, set value is true",0,null,null],["can also be set in OPEN state",0,null,null],["setting on synchronous XHR",0,null,null],["setting withCredentials when not in UNSENT, OPENED state (asynchronous)",0,null,null],["setting withCredentials when in DONE state (synchronous)",0,null,null]]]}] 03:23:04 INFO - ..... 03:23:04 INFO - TEST-OK | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.html | took 1605ms 03:23:04 INFO - PROCESS | 3752 | 1483615384156 Marionette TRACE conn4 -> [0,277,"getWindowHandle",null] 03:23:04 INFO - PROCESS | 3752 | 1483615384158 Marionette TRACE conn4 <- [1,277,null,{"value":"12"}] 03:23:04 INFO - TEST-START | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker 03:23:04 INFO - PROCESS | 3752 | 1483615384163 Marionette TRACE conn4 -> [0,278,"timeouts",{"script":35000}] 03:23:04 INFO - PROCESS | 3752 | 1483615384165 Marionette TRACE conn4 <- [1,278,null,{}] 03:23:04 INFO - PROCESS | 3752 | 1483615384169 Marionette TRACE conn4 -> [0,279,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:04 INFO - PROCESS | 3752 | 1483615384280 Marionette TRACE conn4 <- [1,279,null,{"value":null}] 03:23:04 INFO - PROCESS | 3752 | 1483615384288 Marionette TRACE conn4 -> [0,280,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:04 INFO - PROCESS | 3752 | ++DOCSHELL 12BFAC00 == 33 [pid = 3752] [id = 79] 03:23:04 INFO - PROCESS | 3752 | ++DOMWINDOW == 57 (189DD800) [pid = 3752] [serial = 237] [outer = 00000000] 03:23:04 INFO - PROCESS | 3752 | ++DOMWINDOW == 58 (19ABB800) [pid = 3752] [serial = 238] [outer = 189DD800] 03:23:04 INFO - PROCESS | 3752 | 1483615384342 Marionette DEBUG loaded listener.js 03:23:04 INFO - PROCESS | 3752 | ++DOMWINDOW == 59 (19ABAC00) [pid = 3752] [serial = 239] [outer = 189DD800] 03:23:04 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:23:06 INFO - PROCESS | 3752 | 1483615386050 Marionette TRACE conn4 <- [1,280,null,{"value":["/XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker",0,null,null,[["default value is false, set value is true",0,{},{}],["can also be set in OPEN state",0,{},{}],["setting on synchronous XHR",0,{},{}],["setting withCredentials when not in UNSENT, OPENED state (asynchronous)",0,{},{}],["setting withCredentials when in DONE state (synchronous)",0,{},{}]]]}] 03:23:06 INFO - ..... 03:23:06 INFO - TEST-OK | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker | took 1901ms 03:23:06 INFO - PROCESS | 3752 | 1483615386074 Marionette TRACE conn4 -> [0,281,"getWindowHandle",null] 03:23:06 INFO - TEST-START | /XMLHttpRequest/abort-after-receive.htm 03:23:06 INFO - PROCESS | 3752 | 1483615386080 Marionette TRACE conn4 <- [1,281,null,{"value":"12"}] 03:23:06 INFO - PROCESS | 3752 | 1483615386087 Marionette TRACE conn4 -> [0,282,"timeouts",{"script":35000}] 03:23:06 INFO - PROCESS | 3752 | 1483615386092 Marionette TRACE conn4 <- [1,282,null,{}] 03:23:06 INFO - PROCESS | 3752 | 1483615386146 Marionette TRACE conn4 -> [0,283,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:06 INFO - PROCESS | 3752 | 1483615386250 Marionette TRACE conn4 <- [1,283,null,{"value":null}] 03:23:06 INFO - PROCESS | 3752 | 1483615386364 Marionette TRACE conn4 -> [0,284,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-receive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-receive.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:06 INFO - PROCESS | 3752 | ++DOCSHELL 105A3C00 == 34 [pid = 3752] [id = 80] 03:23:06 INFO - PROCESS | 3752 | ++DOMWINDOW == 60 (105A4400) [pid = 3752] [serial = 240] [outer = 00000000] 03:23:06 INFO - PROCESS | 3752 | ++DOMWINDOW == 61 (11CB4400) [pid = 3752] [serial = 241] [outer = 105A4400] 03:23:06 INFO - PROCESS | 3752 | 1483615386426 Marionette DEBUG loaded listener.js 03:23:06 INFO - PROCESS | 3752 | ++DOMWINDOW == 62 (11AF7400) [pid = 3752] [serial = 242] [outer = 105A4400] 03:23:06 INFO - PROCESS | 3752 | --DOCSHELL 140E0000 == 33 [pid = 3752] [id = 78] 03:23:06 INFO - PROCESS | 3752 | --DOCSHELL 18691400 == 32 [pid = 3752] [id = 77] 03:23:06 INFO - PROCESS | 3752 | --DOCSHELL 1611B000 == 31 [pid = 3752] [id = 76] 03:23:06 INFO - PROCESS | 3752 | --DOCSHELL 17A63C00 == 30 [pid = 3752] [id = 75] 03:23:06 INFO - PROCESS | 3752 | --DOCSHELL 17AE2000 == 29 [pid = 3752] [id = 74] 03:23:06 INFO - PROCESS | 3752 | --DOCSHELL 168B8000 == 28 [pid = 3752] [id = 73] 03:23:06 INFO - PROCESS | 3752 | --DOCSHELL 15F64800 == 27 [pid = 3752] [id = 72] 03:23:06 INFO - PROCESS | 3752 | --DOCSHELL 140E5400 == 26 [pid = 3752] [id = 71] 03:23:06 INFO - PROCESS | 3752 | --DOCSHELL 12BF4800 == 25 [pid = 3752] [id = 70] 03:23:06 INFO - PROCESS | 3752 | --DOMWINDOW == 61 (1449AC00) [pid = 3752] [serial = 192] [outer = 00000000] [url = about:blank] 03:23:06 INFO - PROCESS | 3752 | --DOMWINDOW == 60 (184BEC00) [pid = 3752] [serial = 200] [outer = 00000000] [url = about:blank] 03:23:06 INFO - PROCESS | 3752 | --DOMWINDOW == 59 (194B8400) [pid = 3752] [serial = 186] [outer = 00000000] [url = about:blank] 03:23:06 INFO - PROCESS | 3752 | --DOMWINDOW == 58 (13FE9800) [pid = 3752] [serial = 189] [outer = 00000000] [url = about:blank] 03:23:06 INFO - PROCESS | 3752 | --DOMWINDOW == 57 (1129C800) [pid = 3752] [serial = 204] [outer = 00000000] [url = about:blank] 03:23:06 INFO - PROCESS | 3752 | --DOMWINDOW == 56 (18438400) [pid = 3752] [serial = 198] [outer = 00000000] [url = about:blank] 03:23:06 INFO - PROCESS | 3752 | --DOMWINDOW == 55 (1698B400) [pid = 3752] [serial = 195] [outer = 00000000] [url = about:blank] 03:23:06 INFO - PROCESS | 3752 | --DOMWINDOW == 54 (194C5C00) [pid = 3752] [serial = 206] [outer = 00000000] [url = about:blank] 03:23:06 INFO - PROCESS | 3752 | --DOMWINDOW == 53 (11AF8400) [pid = 3752] [serial = 203] [outer = 00000000] [url = about:blank] 03:23:06 INFO - PROCESS | 3752 | --DOMWINDOW == 52 (184BA000) [pid = 3752] [serial = 201] [outer = 00000000] [url = about:blank] 03:23:06 INFO - PROCESS | 3752 | --DOMWINDOW == 51 (18439800) [pid = 3752] [serial = 197] [outer = 00000000] [url = about:blank] 03:23:06 INFO - PROCESS | 3752 | --DOMWINDOW == 50 (16987000) [pid = 3752] [serial = 194] [outer = 00000000] [url = about:blank] 03:23:06 INFO - PROCESS | 3752 | --DOMWINDOW == 49 (14776400) [pid = 3752] [serial = 191] [outer = 00000000] [url = about:blank] 03:23:06 INFO - PROCESS | 3752 | --DOMWINDOW == 48 (12151800) [pid = 3752] [serial = 188] [outer = 00000000] [url = about:blank] 03:23:07 INFO - PROCESS | 3752 | 1483615387013 Marionette TRACE conn4 <- [1,284,null,{"value":["/XMLHttpRequest/abort-after-receive.htm",0,null,null,[["XMLHttpRequest: abort() after successful receive should not fire \"abort\" event",0,null,null]]]}] 03:23:07 INFO - . 03:23:07 INFO - TEST-OK | /XMLHttpRequest/abort-after-receive.htm | took 935ms 03:23:07 INFO - PROCESS | 3752 | 1483615387029 Marionette TRACE conn4 -> [0,285,"getWindowHandle",null] 03:23:07 INFO - PROCESS | 3752 | 1483615387036 Marionette TRACE conn4 <- [1,285,null,{"value":"12"}] 03:23:07 INFO - TEST-START | /XMLHttpRequest/abort-after-send.htm 03:23:07 INFO - PROCESS | 3752 | 1483615387045 Marionette TRACE conn4 -> [0,286,"timeouts",{"script":35000}] 03:23:07 INFO - PROCESS | 3752 | 1483615387049 Marionette TRACE conn4 <- [1,286,null,{}] 03:23:07 INFO - PROCESS | 3752 | 1483615387059 Marionette TRACE conn4 -> [0,287,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:07 INFO - PROCESS | 3752 | 1483615387156 Marionette TRACE conn4 <- [1,287,null,{"value":null}] 03:23:07 INFO - PROCESS | 3752 | 1483615387163 Marionette TRACE conn4 -> [0,288,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-send.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:07 INFO - PROCESS | 3752 | ++DOCSHELL 12B2B400 == 26 [pid = 3752] [id = 81] 03:23:07 INFO - PROCESS | 3752 | ++DOMWINDOW == 49 (12BEE800) [pid = 3752] [serial = 243] [outer = 00000000] 03:23:07 INFO - PROCESS | 3752 | ++DOMWINDOW == 50 (12DE2000) [pid = 3752] [serial = 244] [outer = 12BEE800] 03:23:07 INFO - PROCESS | 3752 | 1483615387220 Marionette DEBUG loaded listener.js 03:23:07 INFO - PROCESS | 3752 | ++DOMWINDOW == 51 (12DDF400) [pid = 3752] [serial = 245] [outer = 12BEE800] 03:23:07 INFO - PROCESS | 3752 | 1483615387598 Marionette TRACE conn4 <- [1,288,null,{"value":["/XMLHttpRequest/abort-after-send.htm",0,null,null,[["XMLHttpRequest: abort() after send()",0,null,null]]]}] 03:23:07 INFO - . 03:23:07 INFO - TEST-OK | /XMLHttpRequest/abort-after-send.htm | took 592ms 03:23:07 INFO - PROCESS | 3752 | 1483615387643 Marionette TRACE conn4 -> [0,289,"getWindowHandle",null] 03:23:07 INFO - PROCESS | 3752 | 1483615387647 Marionette TRACE conn4 <- [1,289,null,{"value":"12"}] 03:23:07 INFO - PROCESS | 3752 | 1483615387651 Marionette TRACE conn4 -> [0,290,"timeouts",{"script":35000}] 03:23:07 INFO - TEST-START | /XMLHttpRequest/abort-after-stop.htm 03:23:07 INFO - PROCESS | 3752 | 1483615387656 Marionette TRACE conn4 <- [1,290,null,{}] 03:23:07 INFO - PROCESS | 3752 | 1483615387670 Marionette TRACE conn4 -> [0,291,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:07 INFO - PROCESS | 3752 | 1483615387769 Marionette TRACE conn4 <- [1,291,null,{"value":null}] 03:23:07 INFO - PROCESS | 3752 | 1483615387778 Marionette TRACE conn4 -> [0,292,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-stop.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:07 INFO - PROCESS | 3752 | ++DOCSHELL 140C0800 == 27 [pid = 3752] [id = 82] 03:23:07 INFO - PROCESS | 3752 | ++DOMWINDOW == 52 (140C0C00) [pid = 3752] [serial = 246] [outer = 00000000] 03:23:07 INFO - PROCESS | 3752 | ++DOMWINDOW == 53 (1448BC00) [pid = 3752] [serial = 247] [outer = 140C0C00] 03:23:07 INFO - PROCESS | 3752 | 1483615387835 Marionette DEBUG loaded listener.js 03:23:07 INFO - PROCESS | 3752 | ++DOMWINDOW == 54 (13D78400) [pid = 3752] [serial = 248] [outer = 140C0C00] 03:23:09 INFO - PROCESS | 3752 | --DOMWINDOW == 53 (15F6B800) [pid = 3752] [serial = 217] [outer = 00000000] [url = http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/constructor-object.worker] 03:23:09 INFO - PROCESS | 3752 | --DOMWINDOW == 52 (19223400) [pid = 3752] [serial = 205] [outer = 00000000] [url = http://web-platform.test:8000/WebCryptoAPI/sign_verify/test_rsa_pss.html] 03:23:09 INFO - PROCESS | 3752 | --DOMWINDOW == 51 (12BF6000) [pid = 3752] [serial = 211] [outer = 00000000] [url = http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/DOMException-constructor.html] 03:23:09 INFO - PROCESS | 3752 | --DOMWINDOW == 50 (1843A800) [pid = 3752] [serial = 234] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html] 03:23:09 INFO - PROCESS | 3752 | --DOMWINDOW == 49 (140E6000) [pid = 3752] [serial = 214] [outer = 00000000] [url = http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/constructor-object.html] 03:23:09 INFO - PROCESS | 3752 | --DOMWINDOW == 48 (11B94000) [pid = 3752] [serial = 208] [outer = 00000000] [url = http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/DOMException-constants.html] 03:23:09 INFO - PROCESS | 3752 | --DOMWINDOW == 47 (18691800) [pid = 3752] [serial = 231] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/FormData-append.html] 03:23:09 INFO - PROCESS | 3752 | --DOMWINDOW == 46 (17CA0C00) [pid = 3752] [serial = 228] [outer = 00000000] [url = http://web-platform.test:8000/WebIDL/ecmascript-binding/interface-object.html] 03:23:09 INFO - PROCESS | 3752 | --DOMWINDOW == 45 (17A64800) [pid = 3752] [serial = 225] [outer = 00000000] [url = http://web-platform.test:8000/WebIDL/ecmascript-binding/has-instance.html] 03:23:09 INFO - PROCESS | 3752 | --DOMWINDOW == 44 (17AE2400) [pid = 3752] [serial = 223] [outer = 00000000] [url = about:blank] 03:23:09 INFO - PROCESS | 3752 | --DOMWINDOW == 43 (1698F400) [pid = 3752] [serial = 220] [outer = 00000000] [url = http://web-platform.test:8000/WebIDL/ecmascript-binding/es-exceptions/exceptions.html] 03:23:14 INFO - PROCESS | 3752 | --DOCSHELL 12DEC400 == 26 [pid = 3752] [id = 63] 03:23:14 INFO - PROCESS | 3752 | --DOCSHELL 160D7C00 == 25 [pid = 3752] [id = 64] 03:23:14 INFO - PROCESS | 3752 | --DOCSHELL 0F693800 == 24 [pid = 3752] [id = 62] 03:23:14 INFO - PROCESS | 3752 | --DOCSHELL 184B6400 == 23 [pid = 3752] [id = 61] 03:23:14 INFO - PROCESS | 3752 | --DOCSHELL 17C9BC00 == 22 [pid = 3752] [id = 60] 03:23:14 INFO - PROCESS | 3752 | --DOCSHELL 1921F400 == 21 [pid = 3752] [id = 68] 03:23:14 INFO - PROCESS | 3752 | --DOCSHELL 0FB02C00 == 20 [pid = 3752] [id = 67] 03:23:14 INFO - PROCESS | 3752 | --DOCSHELL 16D10000 == 19 [pid = 3752] [id = 59] 03:23:14 INFO - PROCESS | 3752 | --DOCSHELL 12B24800 == 18 [pid = 3752] [id = 53] 03:23:14 INFO - PROCESS | 3752 | --DOCSHELL 1441F400 == 17 [pid = 3752] [id = 58] 03:23:14 INFO - PROCESS | 3752 | --DOCSHELL 14B61000 == 16 [pid = 3752] [id = 54] 03:23:14 INFO - PROCESS | 3752 | --DOCSHELL 13FF3C00 == 15 [pid = 3752] [id = 66] 03:23:14 INFO - PROCESS | 3752 | --DOCSHELL 18435800 == 14 [pid = 3752] [id = 65] 03:23:14 INFO - PROCESS | 3752 | --DOCSHELL 0FB08000 == 13 [pid = 3752] [id = 52] 03:23:14 INFO - PROCESS | 3752 | --DOCSHELL 16837800 == 12 [pid = 3752] [id = 55] 03:23:14 INFO - PROCESS | 3752 | --DOCSHELL 1288CC00 == 11 [pid = 3752] [id = 57] 03:23:14 INFO - PROCESS | 3752 | --DOCSHELL 11B91C00 == 10 [pid = 3752] [id = 69] 03:23:14 INFO - PROCESS | 3752 | --DOCSHELL 0FE45400 == 9 [pid = 3752] [id = 56] 03:23:14 INFO - PROCESS | 3752 | --DOCSHELL 12B2B400 == 8 [pid = 3752] [id = 81] 03:23:14 INFO - PROCESS | 3752 | --DOCSHELL 12BFAC00 == 7 [pid = 3752] [id = 79] 03:23:14 INFO - PROCESS | 3752 | --DOCSHELL 105A3C00 == 6 [pid = 3752] [id = 80] 03:23:14 INFO - PROCESS | 3752 | --DOMWINDOW == 42 (16783C00) [pid = 3752] [serial = 219] [outer = 00000000] [url = about:blank] 03:23:14 INFO - PROCESS | 3752 | --DOMWINDOW == 41 (19ABC400) [pid = 3752] [serial = 207] [outer = 00000000] [url = about:blank] 03:23:14 INFO - PROCESS | 3752 | --DOMWINDOW == 40 (13FEB000) [pid = 3752] [serial = 213] [outer = 00000000] [url = about:blank] 03:23:14 INFO - PROCESS | 3752 | --DOMWINDOW == 39 (18B79C00) [pid = 3752] [serial = 235] [outer = 00000000] [url = about:blank] 03:23:14 INFO - PROCESS | 3752 | --DOMWINDOW == 38 (14BBA000) [pid = 3752] [serial = 216] [outer = 00000000] [url = about:blank] 03:23:14 INFO - PROCESS | 3752 | --DOMWINDOW == 37 (11E61C00) [pid = 3752] [serial = 210] [outer = 00000000] [url = about:blank] 03:23:14 INFO - PROCESS | 3752 | --DOMWINDOW == 36 (11104800) [pid = 3752] [serial = 233] [outer = 00000000] [url = about:blank] 03:23:14 INFO - PROCESS | 3752 | --DOMWINDOW == 35 (184B7800) [pid = 3752] [serial = 230] [outer = 00000000] [url = about:blank] 03:23:14 INFO - PROCESS | 3752 | --DOMWINDOW == 34 (17C9D800) [pid = 3752] [serial = 227] [outer = 00000000] [url = about:blank] 03:23:14 INFO - PROCESS | 3752 | --DOMWINDOW == 33 (17AE3400) [pid = 3752] [serial = 224] [outer = 00000000] [url = about:blank] 03:23:14 INFO - PROCESS | 3752 | --DOMWINDOW == 32 (16DD8400) [pid = 3752] [serial = 222] [outer = 00000000] [url = about:blank] 03:23:14 INFO - PROCESS | 3752 | --DOMWINDOW == 31 (18B77000) [pid = 3752] [serial = 236] [outer = 00000000] [url = about:blank] 03:23:14 INFO - PROCESS | 3752 | --DOMWINDOW == 30 (18699C00) [pid = 3752] [serial = 232] [outer = 00000000] [url = about:blank] 03:23:14 INFO - PROCESS | 3752 | --DOMWINDOW == 29 (184B6000) [pid = 3752] [serial = 229] [outer = 00000000] [url = about:blank] 03:23:14 INFO - PROCESS | 3752 | --DOMWINDOW == 28 (17CA3000) [pid = 3752] [serial = 226] [outer = 00000000] [url = about:blank] 03:23:14 INFO - PROCESS | 3752 | --DOMWINDOW == 27 (16FA2400) [pid = 3752] [serial = 221] [outer = 00000000] [url = about:blank] 03:23:14 INFO - PROCESS | 3752 | --DOMWINDOW == 26 (1665C400) [pid = 3752] [serial = 218] [outer = 00000000] [url = about:blank] 03:23:14 INFO - PROCESS | 3752 | --DOMWINDOW == 25 (15E78400) [pid = 3752] [serial = 215] [outer = 00000000] [url = about:blank] 03:23:14 INFO - PROCESS | 3752 | --DOMWINDOW == 24 (13D83C00) [pid = 3752] [serial = 212] [outer = 00000000] [url = about:blank] 03:23:14 INFO - PROCESS | 3752 | --DOMWINDOW == 23 (11E29400) [pid = 3752] [serial = 209] [outer = 00000000] [url = about:blank] 03:23:16 INFO - PROCESS | 3752 | --DOMWINDOW == 22 (105A4400) [pid = 3752] [serial = 240] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-receive.htm] 03:23:16 INFO - PROCESS | 3752 | --DOMWINDOW == 21 (12BEE800) [pid = 3752] [serial = 243] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-send.htm] 03:23:16 INFO - PROCESS | 3752 | --DOMWINDOW == 20 (189DD800) [pid = 3752] [serial = 237] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker] 03:23:22 INFO - PROCESS | 3752 | --DOMWINDOW == 19 (11AF7400) [pid = 3752] [serial = 242] [outer = 00000000] [url = about:blank] 03:23:22 INFO - PROCESS | 3752 | --DOMWINDOW == 18 (12DDF400) [pid = 3752] [serial = 245] [outer = 00000000] [url = about:blank] 03:23:22 INFO - PROCESS | 3752 | --DOMWINDOW == 17 (19ABAC00) [pid = 3752] [serial = 239] [outer = 00000000] [url = about:blank] 03:23:22 INFO - PROCESS | 3752 | --DOMWINDOW == 16 (1448BC00) [pid = 3752] [serial = 247] [outer = 00000000] [url = about:blank] 03:23:22 INFO - PROCESS | 3752 | --DOMWINDOW == 15 (12DE2000) [pid = 3752] [serial = 244] [outer = 00000000] [url = about:blank] 03:23:22 INFO - PROCESS | 3752 | --DOMWINDOW == 14 (11CB4400) [pid = 3752] [serial = 241] [outer = 00000000] [url = about:blank] 03:23:22 INFO - PROCESS | 3752 | --DOMWINDOW == 13 (19ABB800) [pid = 3752] [serial = 238] [outer = 00000000] [url = about:blank] 03:23:37 INFO - PROCESS | 3752 | MARIONETTE LOG: INFO: Timeout fired 03:23:37 INFO - PROCESS | 3752 | 1483615417899 Marionette TRACE conn4 <- [1,292,null,{"value":["/XMLHttpRequest/abort-after-stop.htm",2,null,null,[["XMLHttpRequest: abort event should fire when stop() method is used",1,"assert_equals: expected true but got false","@http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm:24:13\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\n@http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm:23:11\n"]]]}] 03:23:37 INFO - . 03:23:37 INFO - TEST-TIMEOUT | /XMLHttpRequest/abort-after-stop.htm | took 30262ms 03:23:37 INFO - PROCESS | 3752 | 1483615417936 Marionette TRACE conn4 -> [0,293,"getWindowHandle",null] 03:23:37 INFO - PROCESS | 3752 | 1483615417942 Marionette TRACE conn4 <- [1,293,null,{"value":"12"}] 03:23:37 INFO - TEST-START | /XMLHttpRequest/abort-after-timeout.htm 03:23:37 INFO - PROCESS | 3752 | 1483615417949 Marionette TRACE conn4 -> [0,294,"timeouts",{"script":35000}] 03:23:37 INFO - PROCESS | 3752 | 1483615417953 Marionette TRACE conn4 <- [1,294,null,{}] 03:23:37 INFO - PROCESS | 3752 | 1483615417961 Marionette TRACE conn4 -> [0,295,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:38 INFO - PROCESS | 3752 | 1483615418077 Marionette TRACE conn4 <- [1,295,null,{"value":null}] 03:23:38 INFO - PROCESS | 3752 | 1483615418113 Marionette TRACE conn4 -> [0,296,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-timeout.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-timeout.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:38 INFO - PROCESS | 3752 | ++DOCSHELL 0F9C7800 == 7 [pid = 3752] [id = 83] 03:23:38 INFO - PROCESS | 3752 | ++DOMWINDOW == 14 (0F9C8000) [pid = 3752] [serial = 249] [outer = 00000000] 03:23:38 INFO - PROCESS | 3752 | ++DOMWINDOW == 15 (0FB08400) [pid = 3752] [serial = 250] [outer = 0F9C8000] 03:23:38 INFO - PROCESS | 3752 | 1483615418179 Marionette DEBUG loaded listener.js 03:23:38 INFO - PROCESS | 3752 | ++DOMWINDOW == 16 (0FBB3800) [pid = 3752] [serial = 251] [outer = 0F9C8000] 03:23:38 INFO - PROCESS | 3752 | 1483615418755 Marionette TRACE conn4 <- [1,296,null,{"value":["/XMLHttpRequest/abort-after-timeout.htm",0,null,null,[["XMLHttpRequest: abort() after a timeout should not fire \"abort\" event",0,null,null]]]}] 03:23:38 INFO - . 03:23:38 INFO - TEST-OK | /XMLHttpRequest/abort-after-timeout.htm | took 841ms 03:23:38 INFO - PROCESS | 3752 | 1483615418773 Marionette TRACE conn4 -> [0,297,"getWindowHandle",null] 03:23:38 INFO - PROCESS | 3752 | 1483615418780 Marionette TRACE conn4 <- [1,297,null,{"value":"12"}] 03:23:38 INFO - TEST-START | /XMLHttpRequest/abort-during-done.htm 03:23:38 INFO - PROCESS | 3752 | 1483615418788 Marionette TRACE conn4 -> [0,298,"timeouts",{"script":35000}] 03:23:38 INFO - PROCESS | 3752 | 1483615418793 Marionette TRACE conn4 <- [1,298,null,{}] 03:23:38 INFO - PROCESS | 3752 | 1483615418797 Marionette TRACE conn4 -> [0,299,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:38 INFO - PROCESS | 3752 | 1483615418923 Marionette TRACE conn4 <- [1,299,null,{"value":null}] 03:23:38 INFO - PROCESS | 3752 | 1483615418935 Marionette TRACE conn4 -> [0,300,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-done.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-done.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:38 INFO - PROCESS | 3752 | ++DOCSHELL 11106000 == 8 [pid = 3752] [id = 84] 03:23:38 INFO - PROCESS | 3752 | ++DOMWINDOW == 17 (11108C00) [pid = 3752] [serial = 252] [outer = 00000000] 03:23:38 INFO - PROCESS | 3752 | ++DOMWINDOW == 18 (11371400) [pid = 3752] [serial = 253] [outer = 11108C00] 03:23:38 INFO - PROCESS | 3752 | 1483615418992 Marionette DEBUG loaded listener.js 03:23:39 INFO - PROCESS | 3752 | ++DOMWINDOW == 19 (116E2C00) [pid = 3752] [serial = 254] [outer = 11108C00] 03:23:39 INFO - PROCESS | 3752 | 1483615419337 Marionette TRACE conn4 <- [1,300,null,{"value":["/XMLHttpRequest/abort-during-done.htm",0,null,null,[["XMLHttpRequest: abort() during DONE",0,null,null]]]}] 03:23:39 INFO - . 03:23:39 INFO - TEST-OK | /XMLHttpRequest/abort-during-done.htm | took 592ms 03:23:39 INFO - PROCESS | 3752 | 1483615419386 Marionette TRACE conn4 -> [0,301,"getWindowHandle",null] 03:23:39 INFO - PROCESS | 3752 | 1483615419389 Marionette TRACE conn4 <- [1,301,null,{"value":"12"}] 03:23:39 INFO - TEST-START | /XMLHttpRequest/abort-during-open.htm 03:23:39 INFO - PROCESS | 3752 | 1483615419393 Marionette TRACE conn4 -> [0,302,"timeouts",{"script":35000}] 03:23:39 INFO - PROCESS | 3752 | 1483615419398 Marionette TRACE conn4 <- [1,302,null,{}] 03:23:39 INFO - PROCESS | 3752 | 1483615419410 Marionette TRACE conn4 -> [0,303,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:39 INFO - PROCESS | 3752 | 1483615419550 Marionette TRACE conn4 <- [1,303,null,{"value":null}] 03:23:39 INFO - PROCESS | 3752 | 1483615419559 Marionette TRACE conn4 -> [0,304,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-open.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:39 INFO - PROCESS | 3752 | ++DOCSHELL 11E25800 == 9 [pid = 3752] [id = 85] 03:23:39 INFO - PROCESS | 3752 | ++DOMWINDOW == 20 (1214A400) [pid = 3752] [serial = 255] [outer = 00000000] 03:23:39 INFO - PROCESS | 3752 | ++DOMWINDOW == 21 (12B1F000) [pid = 3752] [serial = 256] [outer = 1214A400] 03:23:39 INFO - PROCESS | 3752 | 1483615419618 Marionette DEBUG loaded listener.js 03:23:39 INFO - PROCESS | 3752 | ++DOMWINDOW == 22 (12B2C000) [pid = 3752] [serial = 257] [outer = 1214A400] 03:23:39 INFO - PROCESS | 3752 | 1483615419997 Marionette TRACE conn4 <- [1,304,null,{"value":["/XMLHttpRequest/abort-during-open.htm",0,null,null,[["XMLHttpRequest: abort() during OPEN",0,null,null]]]}] 03:23:40 INFO - . 03:23:40 INFO - TEST-OK | /XMLHttpRequest/abort-during-open.htm | took 654ms 03:23:40 INFO - PROCESS | 3752 | 1483615420049 Marionette TRACE conn4 -> [0,305,"getWindowHandle",null] 03:23:40 INFO - PROCESS | 3752 | 1483615420052 Marionette TRACE conn4 <- [1,305,null,{"value":"12"}] 03:23:40 INFO - TEST-START | /XMLHttpRequest/abort-during-open.worker 03:23:40 INFO - PROCESS | 3752 | 1483615420056 Marionette TRACE conn4 -> [0,306,"timeouts",{"script":35000}] 03:23:40 INFO - PROCESS | 3752 | 1483615420059 Marionette TRACE conn4 <- [1,306,null,{}] 03:23:40 INFO - PROCESS | 3752 | 1483615420063 Marionette TRACE conn4 -> [0,307,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:40 INFO - PROCESS | 3752 | 1483615420183 Marionette TRACE conn4 <- [1,307,null,{"value":null}] 03:23:40 INFO - PROCESS | 3752 | 1483615420189 Marionette TRACE conn4 -> [0,308,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-open.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-open.worker\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:40 INFO - PROCESS | 3752 | ++DOCSHELL 12DE2000 == 10 [pid = 3752] [id = 86] 03:23:40 INFO - PROCESS | 3752 | ++DOMWINDOW == 23 (12DE4800) [pid = 3752] [serial = 258] [outer = 00000000] 03:23:40 INFO - PROCESS | 3752 | ++DOMWINDOW == 24 (13D7D400) [pid = 3752] [serial = 259] [outer = 12DE4800] 03:23:40 INFO - PROCESS | 3752 | 1483615420243 Marionette DEBUG loaded listener.js 03:23:40 INFO - PROCESS | 3752 | ++DOMWINDOW == 25 (13AE1800) [pid = 3752] [serial = 260] [outer = 12DE4800] 03:23:40 INFO - PROCESS | 3752 | [3752] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970 03:23:40 INFO - PROCESS | 3752 | 1483615420656 Marionette TRACE conn4 <- [1,308,null,{"value":["/XMLHttpRequest/abort-during-open.worker",0,null,null,[["Untitled",0,{},{}]]]}] 03:23:40 INFO - . 03:23:40 INFO - TEST-OK | /XMLHttpRequest/abort-during-open.worker | took 639ms 03:23:40 INFO - PROCESS | 3752 | 1483615420693 Marionette TRACE conn4 -> [0,309,"getWindowHandle",null] 03:23:40 INFO - PROCESS | 3752 | 1483615420695 Marionette TRACE conn4 <- [1,309,null,{"value":"12"}] 03:23:40 INFO - TEST-START | /XMLHttpRequest/abort-during-unsent.htm 03:23:40 INFO - PROCESS | 3752 | 1483615420699 Marionette TRACE conn4 -> [0,310,"timeouts",{"script":35000}] 03:23:40 INFO - PROCESS | 3752 | 1483615420701 Marionette TRACE conn4 <- [1,310,null,{}] 03:23:40 INFO - PROCESS | 3752 | 1483615420705 Marionette TRACE conn4 -> [0,311,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:40 INFO - PROCESS | 3752 | 1483615420815 Marionette TRACE conn4 <- [1,311,null,{"value":null}] 03:23:40 INFO - PROCESS | 3752 | 1483615420823 Marionette TRACE conn4 -> [0,312,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-unsent.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-unsent.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:40 INFO - PROCESS | 3752 | ++DOCSHELL 13D83000 == 11 [pid = 3752] [id = 87] 03:23:40 INFO - PROCESS | 3752 | ++DOMWINDOW == 26 (13FEFC00) [pid = 3752] [serial = 261] [outer = 00000000] 03:23:40 INFO - PROCESS | 3752 | ++DOMWINDOW == 27 (14425C00) [pid = 3752] [serial = 262] [outer = 13FEFC00] 03:23:40 INFO - PROCESS | 3752 | 1483615420876 Marionette DEBUG loaded listener.js 03:23:40 INFO - PROCESS | 3752 | ++DOMWINDOW == 28 (1441E000) [pid = 3752] [serial = 263] [outer = 13FEFC00] 03:23:41 INFO - PROCESS | 3752 | 1483615421200 Marionette TRACE conn4 <- [1,312,null,{"value":["/XMLHttpRequest/abort-during-unsent.htm",0,null,null,[["XMLHttpRequest: abort() during UNSENT",0,null,null]]]}] 03:23:41 INFO - . 03:23:41 INFO - TEST-OK | /XMLHttpRequest/abort-during-unsent.htm | took 530ms 03:23:41 INFO - PROCESS | 3752 | 1483615421234 Marionette TRACE conn4 -> [0,313,"getWindowHandle",null] 03:23:41 INFO - PROCESS | 3752 | 1483615421236 Marionette TRACE conn4 <- [1,313,null,{"value":"12"}] 03:23:41 INFO - TEST-START | /XMLHttpRequest/abort-during-upload.htm 03:23:41 INFO - PROCESS | 3752 | 1483615421240 Marionette TRACE conn4 -> [0,314,"timeouts",{"script":35000}] 03:23:41 INFO - PROCESS | 3752 | 1483615421242 Marionette TRACE conn4 <- [1,314,null,{}] 03:23:41 INFO - PROCESS | 3752 | 1483615421246 Marionette TRACE conn4 -> [0,315,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:41 INFO - PROCESS | 3752 | 1483615421398 Marionette TRACE conn4 <- [1,315,null,{"value":null}] 03:23:41 INFO - PROCESS | 3752 | 1483615421434 Marionette TRACE conn4 -> [0,316,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-upload.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-upload.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:41 INFO - PROCESS | 3752 | ++DOCSHELL 14775C00 == 12 [pid = 3752] [id = 88] 03:23:41 INFO - PROCESS | 3752 | ++DOMWINDOW == 29 (14B5C400) [pid = 3752] [serial = 264] [outer = 00000000] 03:23:41 INFO - PROCESS | 3752 | ++DOMWINDOW == 30 (15F5D400) [pid = 3752] [serial = 265] [outer = 14B5C400] 03:23:41 INFO - PROCESS | 3752 | 1483615421491 Marionette DEBUG loaded listener.js 03:23:41 INFO - PROCESS | 3752 | ++DOMWINDOW == 31 (160CF800) [pid = 3752] [serial = 266] [outer = 14B5C400] 03:23:41 INFO - PROCESS | 3752 | 1483615421801 Marionette TRACE conn4 <- [1,316,null,{"value":["/XMLHttpRequest/abort-during-upload.htm",0,null,null,[["XMLHttpRequest: abort() while sending data",0,null,null]]]}] 03:23:41 INFO - . 03:23:41 INFO - TEST-OK | /XMLHttpRequest/abort-during-upload.htm | took 592ms 03:23:41 INFO - PROCESS | 3752 | 1483615421836 Marionette TRACE conn4 -> [0,317,"getWindowHandle",null] 03:23:41 INFO - PROCESS | 3752 | 1483615421838 Marionette TRACE conn4 <- [1,317,null,{"value":"12"}] 03:23:41 INFO - TEST-START | /XMLHttpRequest/abort-event-abort.htm 03:23:41 INFO - PROCESS | 3752 | 1483615421842 Marionette TRACE conn4 -> [0,318,"timeouts",{"script":35000}] 03:23:41 INFO - PROCESS | 3752 | 1483615421844 Marionette TRACE conn4 <- [1,318,null,{}] 03:23:41 INFO - PROCESS | 3752 | 1483615421849 Marionette TRACE conn4 -> [0,319,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:41 INFO - PROCESS | 3752 | 1483615421932 Marionette TRACE conn4 <- [1,319,null,{"value":null}] 03:23:41 INFO - PROCESS | 3752 | 1483615421990 Marionette TRACE conn4 -> [0,320,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-abort.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:41 INFO - PROCESS | 3752 | ++DOCSHELL 12895C00 == 13 [pid = 3752] [id = 89] 03:23:41 INFO - PROCESS | 3752 | ++DOMWINDOW == 32 (15F5D800) [pid = 3752] [serial = 267] [outer = 00000000] 03:23:42 INFO - PROCESS | 3752 | ++DOMWINDOW == 33 (160DE000) [pid = 3752] [serial = 268] [outer = 15F5D800] 03:23:42 INFO - PROCESS | 3752 | 1483615422047 Marionette DEBUG loaded listener.js 03:23:42 INFO - PROCESS | 3752 | ++DOMWINDOW == 34 (16114400) [pid = 3752] [serial = 269] [outer = 15F5D800] 03:23:42 INFO - PROCESS | 3752 | 1483615422340 Marionette TRACE conn4 <- [1,320,null,{"value":["/XMLHttpRequest/abort-event-abort.htm",0,null,null,[["XMLHttpRequest: The abort() method: do not fire abort event in OPENED state when send() flag is unset. send() throws after abort().",0,null,null]]]}] 03:23:42 INFO - . 03:23:42 INFO - TEST-OK | /XMLHttpRequest/abort-event-abort.htm | took 530ms 03:23:42 INFO - PROCESS | 3752 | 1483615422377 Marionette TRACE conn4 -> [0,321,"getWindowHandle",null] 03:23:42 INFO - PROCESS | 3752 | 1483615422380 Marionette TRACE conn4 <- [1,321,null,{"value":"12"}] 03:23:42 INFO - TEST-START | /XMLHttpRequest/abort-event-listeners.htm 03:23:42 INFO - PROCESS | 3752 | 1483615422384 Marionette TRACE conn4 -> [0,322,"timeouts",{"script":35000}] 03:23:42 INFO - PROCESS | 3752 | 1483615422385 Marionette TRACE conn4 <- [1,322,null,{}] 03:23:42 INFO - PROCESS | 3752 | 1483615422390 Marionette TRACE conn4 -> [0,323,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:42 INFO - PROCESS | 3752 | 1483615422472 Marionette TRACE conn4 <- [1,323,null,{"value":null}] 03:23:42 INFO - PROCESS | 3752 | 1483615422478 Marionette TRACE conn4 -> [0,324,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-listeners.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-listeners.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:42 INFO - PROCESS | 3752 | ++DOCSHELL 16782400 == 14 [pid = 3752] [id = 90] 03:23:42 INFO - PROCESS | 3752 | ++DOMWINDOW == 35 (16782C00) [pid = 3752] [serial = 270] [outer = 00000000] 03:23:42 INFO - PROCESS | 3752 | ++DOMWINDOW == 36 (168B8C00) [pid = 3752] [serial = 271] [outer = 16782C00] 03:23:42 INFO - PROCESS | 3752 | 1483615422531 Marionette DEBUG loaded listener.js 03:23:42 INFO - PROCESS | 3752 | ++DOMWINDOW == 37 (168ADC00) [pid = 3752] [serial = 272] [outer = 16782C00] 03:23:42 INFO - PROCESS | 3752 | 1483615422884 Marionette TRACE conn4 <- [1,324,null,{"value":["/XMLHttpRequest/abort-event-listeners.htm",0,null,null,[["XMLHttpRequest: abort() should not reset event listeners",0,null,null]]]}] 03:23:42 INFO - . 03:23:42 INFO - TEST-OK | /XMLHttpRequest/abort-event-listeners.htm | took 530ms 03:23:42 INFO - PROCESS | 3752 | 1483615422918 Marionette TRACE conn4 -> [0,325,"getWindowHandle",null] 03:23:42 INFO - PROCESS | 3752 | 1483615422920 Marionette TRACE conn4 <- [1,325,null,{"value":"12"}] 03:23:42 INFO - TEST-START | /XMLHttpRequest/abort-event-loadend.htm 03:23:42 INFO - PROCESS | 3752 | 1483615422924 Marionette TRACE conn4 -> [0,326,"timeouts",{"script":35000}] 03:23:42 INFO - PROCESS | 3752 | 1483615422926 Marionette TRACE conn4 <- [1,326,null,{}] 03:23:42 INFO - PROCESS | 3752 | 1483615422930 Marionette TRACE conn4 -> [0,327,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:43 INFO - PROCESS | 3752 | 1483615423013 Marionette TRACE conn4 <- [1,327,null,{"value":null}] 03:23:43 INFO - PROCESS | 3752 | 1483615423019 Marionette TRACE conn4 -> [0,328,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-loadend.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-loadend.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:43 INFO - PROCESS | 3752 | ++DOCSHELL 1698A800 == 15 [pid = 3752] [id = 91] 03:23:43 INFO - PROCESS | 3752 | ++DOMWINDOW == 38 (1698C800) [pid = 3752] [serial = 273] [outer = 00000000] 03:23:43 INFO - PROCESS | 3752 | ++DOMWINDOW == 39 (16D0F400) [pid = 3752] [serial = 274] [outer = 1698C800] 03:23:43 INFO - PROCESS | 3752 | 1483615423070 Marionette DEBUG loaded listener.js 03:23:43 INFO - PROCESS | 3752 | ++DOMWINDOW == 40 (16D0E000) [pid = 3752] [serial = 275] [outer = 1698C800] 03:23:43 INFO - PROCESS | 3752 | 1483615423417 Marionette TRACE conn4 <- [1,328,null,{"value":["/XMLHttpRequest/abort-event-loadend.htm",0,null,null,[["XMLHttpRequest: The abort() method: Fire a progress event named loadend",0,null,null]]]}] 03:23:43 INFO - . 03:23:43 INFO - TEST-OK | /XMLHttpRequest/abort-event-loadend.htm | took 529ms 03:23:43 INFO - PROCESS | 3752 | 1483615423459 Marionette TRACE conn4 -> [0,329,"getWindowHandle",null] 03:23:43 INFO - PROCESS | 3752 | 1483615423461 Marionette TRACE conn4 <- [1,329,null,{"value":"12"}] 03:23:43 INFO - TEST-START | /XMLHttpRequest/abort-event-order.htm 03:23:43 INFO - PROCESS | 3752 | 1483615423465 Marionette TRACE conn4 -> [0,330,"timeouts",{"script":35000}] 03:23:43 INFO - PROCESS | 3752 | 1483615423467 Marionette TRACE conn4 <- [1,330,null,{}] 03:23:43 INFO - PROCESS | 3752 | 1483615423471 Marionette TRACE conn4 -> [0,331,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:43 INFO - PROCESS | 3752 | 1483615423578 Marionette TRACE conn4 <- [1,331,null,{"value":null}] 03:23:43 INFO - PROCESS | 3752 | 1483615423585 Marionette TRACE conn4 -> [0,332,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-order.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-order.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:43 INFO - PROCESS | 3752 | ++DOCSHELL 12DEC800 == 16 [pid = 3752] [id = 92] 03:23:43 INFO - PROCESS | 3752 | ++DOMWINDOW == 41 (1665CC00) [pid = 3752] [serial = 276] [outer = 00000000] 03:23:43 INFO - PROCESS | 3752 | ++DOMWINDOW == 42 (1734F800) [pid = 3752] [serial = 277] [outer = 1665CC00] 03:23:43 INFO - PROCESS | 3752 | 1483615423648 Marionette DEBUG loaded listener.js 03:23:43 INFO - PROCESS | 3752 | ++DOMWINDOW == 43 (16FA4C00) [pid = 3752] [serial = 278] [outer = 1665CC00] 03:23:43 INFO - PROCESS | 3752 | 1483615423968 Marionette TRACE conn4 <- [1,332,null,{"value":["/XMLHttpRequest/abort-event-order.htm",0,null,null,[["XMLHttpRequest: The abort() method: abort and loadend events",0,null,null]]]}] 03:23:43 INFO - . 03:23:43 INFO - TEST-OK | /XMLHttpRequest/abort-event-order.htm | took 530ms 03:23:43 INFO - PROCESS | 3752 | 1483615424000 Marionette TRACE conn4 -> [0,333,"getWindowHandle",null] 03:23:43 INFO - PROCESS | 3752 | 1483615424003 Marionette TRACE conn4 <- [1,333,null,{"value":"12"}] 03:23:43 INFO - TEST-START | /XMLHttpRequest/abort-upload-event-abort.htm 03:23:43 INFO - PROCESS | 3752 | 1483615424006 Marionette TRACE conn4 -> [0,334,"timeouts",{"script":35000}] 03:23:43 INFO - PROCESS | 3752 | 1483615424008 Marionette TRACE conn4 <- [1,334,null,{}] 03:23:43 INFO - PROCESS | 3752 | 1483615424012 Marionette TRACE conn4 -> [0,335,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:44 INFO - PROCESS | 3752 | 1483615424110 Marionette TRACE conn4 <- [1,335,null,{"value":null}] 03:23:44 INFO - PROCESS | 3752 | 1483615424117 Marionette TRACE conn4 -> [0,336,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-upload-event-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-abort.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:44 INFO - PROCESS | 3752 | ++DOCSHELL 17ADD000 == 17 [pid = 3752] [id = 93] 03:23:44 INFO - PROCESS | 3752 | ++DOMWINDOW == 44 (17AE0400) [pid = 3752] [serial = 279] [outer = 00000000] 03:23:44 INFO - PROCESS | 3752 | ++DOMWINDOW == 45 (17C98400) [pid = 3752] [serial = 280] [outer = 17AE0400] 03:23:44 INFO - PROCESS | 3752 | 1483615424236 Marionette DEBUG loaded listener.js 03:23:44 INFO - PROCESS | 3752 | ++DOMWINDOW == 46 (17C99400) [pid = 3752] [serial = 281] [outer = 17AE0400] 03:23:44 INFO - PROCESS | 3752 | 1483615424535 Marionette TRACE conn4 <- [1,336,null,{"value":["/XMLHttpRequest/abort-upload-event-abort.htm",0,null,null,[["XMLHttpRequest: The abort() method: Fire a progress event named abort on the XMLHttpRequestUpload object",0,null,null]]]}] 03:23:44 INFO - . 03:23:44 INFO - TEST-OK | /XMLHttpRequest/abort-upload-event-abort.htm | took 592ms 03:23:44 INFO - TEST-START | /XMLHttpRequest/abort-upload-event-loadend.htm 03:23:44 INFO - PROCESS | 3752 | 1483615424603 Marionette TRACE conn4 -> [0,337,"getWindowHandle",null] 03:23:44 INFO - PROCESS | 3752 | 1483615424605 Marionette TRACE conn4 <- [1,337,null,{"value":"12"}] 03:23:44 INFO - PROCESS | 3752 | 1483615424609 Marionette TRACE conn4 -> [0,338,"timeouts",{"script":35000}] 03:23:44 INFO - PROCESS | 3752 | 1483615424611 Marionette TRACE conn4 <- [1,338,null,{}] 03:23:44 INFO - PROCESS | 3752 | 1483615424615 Marionette TRACE conn4 -> [0,339,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:44 INFO - PROCESS | 3752 | 1483615424728 Marionette TRACE conn4 <- [1,339,null,{"value":null}] 03:23:44 INFO - PROCESS | 3752 | 1483615424766 Marionette TRACE conn4 -> [0,340,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-upload-event-loadend.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-loadend.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:44 INFO - PROCESS | 3752 | ++DOCSHELL 17CA2C00 == 18 [pid = 3752] [id = 94] 03:23:44 INFO - PROCESS | 3752 | ++DOMWINDOW == 47 (17CA3400) [pid = 3752] [serial = 282] [outer = 00000000] 03:23:44 INFO - PROCESS | 3752 | ++DOMWINDOW == 48 (1843CC00) [pid = 3752] [serial = 283] [outer = 17CA3400] 03:23:44 INFO - PROCESS | 3752 | 1483615424816 Marionette DEBUG loaded listener.js 03:23:44 INFO - PROCESS | 3752 | ++DOMWINDOW == 49 (18439000) [pid = 3752] [serial = 284] [outer = 17CA3400] 03:23:45 INFO - PROCESS | 3752 | 1483615425111 Marionette TRACE conn4 <- [1,340,null,{"value":["/XMLHttpRequest/abort-upload-event-loadend.htm",0,null,null,[["XMLHttpRequest: The abort() method: Fire a progress event named loadend on the XMLHttpRequestUpload object",0,null,null]]]}] 03:23:45 INFO - . 03:23:45 INFO - TEST-OK | /XMLHttpRequest/abort-upload-event-loadend.htm | took 529ms 03:23:45 INFO - PROCESS | 3752 | 1483615425126 Marionette TRACE conn4 -> [0,341,"getWindowHandle",null] 03:23:45 INFO - PROCESS | 3752 | 1483615425129 Marionette TRACE conn4 <- [1,341,null,{"value":"12"}] 03:23:45 INFO - TEST-START | /XMLHttpRequest/anonymous-mode-unsupported.htm 03:23:45 INFO - PROCESS | 3752 | 1483615425133 Marionette TRACE conn4 -> [0,342,"timeouts",{"script":35000}] 03:23:45 INFO - PROCESS | 3752 | 1483615425136 Marionette TRACE conn4 <- [1,342,null,{}] 03:23:45 INFO - PROCESS | 3752 | 1483615425140 Marionette TRACE conn4 -> [0,343,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:45 INFO - PROCESS | 3752 | 1483615425246 Marionette TRACE conn4 <- [1,343,null,{"value":null}] 03:23:45 INFO - PROCESS | 3752 | 1483615425253 Marionette TRACE conn4 -> [0,344,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/anonymous-mode-unsupported.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/anonymous-mode-unsupported.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:45 INFO - PROCESS | 3752 | ++DOCSHELL 13FE6400 == 19 [pid = 3752] [id = 95] 03:23:45 INFO - PROCESS | 3752 | ++DOMWINDOW == 50 (13FF2C00) [pid = 3752] [serial = 285] [outer = 00000000] 03:23:45 INFO - PROCESS | 3752 | ++DOMWINDOW == 51 (18441400) [pid = 3752] [serial = 286] [outer = 13FF2C00] 03:23:45 INFO - PROCESS | 3752 | 1483615425307 Marionette DEBUG loaded listener.js 03:23:45 INFO - PROCESS | 3752 | ++DOMWINDOW == 52 (184B5000) [pid = 3752] [serial = 287] [outer = 13FF2C00] 03:23:45 INFO - PROCESS | 3752 | 1483615425647 Marionette TRACE conn4 <- [1,344,null,{"value":["/XMLHttpRequest/anonymous-mode-unsupported.htm",0,null,null,[["XMLHttpRequest: anonymous mode unsupported",0,null,null]]]}] 03:23:45 INFO - . 03:23:45 INFO - TEST-OK | /XMLHttpRequest/anonymous-mode-unsupported.htm | took 530ms 03:23:45 INFO - PROCESS | 3752 | 1483615425667 Marionette TRACE conn4 -> [0,345,"getWindowHandle",null] 03:23:45 INFO - PROCESS | 3752 | 1483615425669 Marionette TRACE conn4 <- [1,345,null,{"value":"12"}] 03:23:45 INFO - TEST-START | /XMLHttpRequest/data-uri.htm 03:23:45 INFO - PROCESS | 3752 | 1483615425675 Marionette TRACE conn4 -> [0,346,"timeouts",{"script":35000}] 03:23:45 INFO - PROCESS | 3752 | 1483615425678 Marionette TRACE conn4 <- [1,346,null,{}] 03:23:45 INFO - PROCESS | 3752 | 1483615425683 Marionette TRACE conn4 -> [0,347,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:45 INFO - PROCESS | 3752 | 1483615425769 Marionette TRACE conn4 <- [1,347,null,{"value":null}] 03:23:45 INFO - PROCESS | 3752 | 1483615425775 Marionette TRACE conn4 -> [0,348,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/data-uri.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/data-uri.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:45 INFO - PROCESS | 3752 | ++DOCSHELL 140C3000 == 20 [pid = 3752] [id = 96] 03:23:45 INFO - PROCESS | 3752 | ++DOMWINDOW == 53 (140C3400) [pid = 3752] [serial = 288] [outer = 00000000] 03:23:45 INFO - PROCESS | 3752 | ++DOMWINDOW == 54 (184BB400) [pid = 3752] [serial = 289] [outer = 140C3400] 03:23:45 INFO - PROCESS | 3752 | 1483615425828 Marionette DEBUG loaded listener.js 03:23:45 INFO - PROCESS | 3752 | ++DOMWINDOW == 55 (184BA800) [pid = 3752] [serial = 290] [outer = 140C3400] 03:23:46 INFO - PROCESS | 3752 | 1483615426338 Marionette TRACE conn4 <- [1,348,null,{"value":["/XMLHttpRequest/data-uri.htm",0,null,null,[["XHR method GET with charset text/plain",0,null,null],["XHR method GET with charset text/plain (base64)",0,null,null],["XHR method GET with charset text/html",0,null,null],["XHR method GET with charset text/html;charset=UTF-8",0,null,null],["XHR method GET with charset image/png",1,"assert_equals: expected \"Hello, World!\" but got \"Hello,World!\"","do_test/ [0,349,"getWindowHandle",null] 03:23:46 INFO - PROCESS | 3752 | 1483615426389 Marionette TRACE conn4 <- [1,349,null,{"value":"12"}] 03:23:46 INFO - TEST-START | /XMLHttpRequest/event-abort.htm 03:23:46 INFO - PROCESS | 3752 | 1483615426395 Marionette TRACE conn4 -> [0,350,"timeouts",{"script":35000}] 03:23:46 INFO - PROCESS | 3752 | 1483615426400 Marionette TRACE conn4 <- [1,350,null,{}] 03:23:46 INFO - PROCESS | 3752 | 1483615426454 Marionette TRACE conn4 -> [0,351,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:46 INFO - PROCESS | 3752 | 1483615426584 Marionette TRACE conn4 <- [1,351,null,{"value":null}] 03:23:46 INFO - PROCESS | 3752 | 1483615426662 Marionette TRACE conn4 -> [0,352,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-abort.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:46 INFO - PROCESS | 3752 | ++DOCSHELL 11AF8C00 == 21 [pid = 3752] [id = 97] 03:23:46 INFO - PROCESS | 3752 | ++DOMWINDOW == 56 (11AFEC00) [pid = 3752] [serial = 291] [outer = 00000000] 03:23:46 INFO - PROCESS | 3752 | ++DOMWINDOW == 57 (12DE7400) [pid = 3752] [serial = 292] [outer = 11AFEC00] 03:23:46 INFO - PROCESS | 3752 | 1483615426741 Marionette DEBUG loaded listener.js 03:23:46 INFO - PROCESS | 3752 | ++DOMWINDOW == 58 (12DE0C00) [pid = 3752] [serial = 293] [outer = 11AFEC00] 03:23:47 INFO - PROCESS | 3752 | 1483615427140 Marionette TRACE conn4 <- [1,352,null,{"value":["/XMLHttpRequest/event-abort.htm",0,null,null,[["XMLHttpRequest: abort event",0,null,null]]]}] 03:23:47 INFO - . 03:23:47 INFO - TEST-OK | /XMLHttpRequest/event-abort.htm | took 794ms 03:23:47 INFO - PROCESS | 3752 | 1483615427194 Marionette TRACE conn4 -> [0,353,"getWindowHandle",null] 03:23:47 INFO - PROCESS | 3752 | 1483615427202 Marionette TRACE conn4 <- [1,353,null,{"value":"12"}] 03:23:47 INFO - TEST-START | /XMLHttpRequest/event-error-order.sub.html 03:23:47 INFO - PROCESS | 3752 | 1483615427210 Marionette TRACE conn4 -> [0,354,"timeouts",{"script":35000}] 03:23:47 INFO - PROCESS | 3752 | 1483615427215 Marionette TRACE conn4 <- [1,354,null,{}] 03:23:47 INFO - PROCESS | 3752 | 1483615427219 Marionette TRACE conn4 -> [0,355,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:47 INFO - PROCESS | 3752 | 1483615427394 Marionette TRACE conn4 <- [1,355,null,{"value":null}] 03:23:47 INFO - PROCESS | 3752 | 1483615427479 Marionette TRACE conn4 -> [0,356,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-error-order.sub.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-error-order.sub.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:47 INFO - PROCESS | 3752 | ++DOCSHELL 140C6400 == 22 [pid = 3752] [id = 98] 03:23:47 INFO - PROCESS | 3752 | ++DOMWINDOW == 59 (1441FC00) [pid = 3752] [serial = 294] [outer = 00000000] 03:23:47 INFO - PROCESS | 3752 | ++DOMWINDOW == 60 (15DDF400) [pid = 3752] [serial = 295] [outer = 1441FC00] 03:23:47 INFO - PROCESS | 3752 | 1483615427548 Marionette DEBUG loaded listener.js 03:23:47 INFO - PROCESS | 3752 | ++DOMWINDOW == 61 (14BB7000) [pid = 3752] [serial = 296] [outer = 1441FC00] 03:23:47 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x804B001E: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 553 03:23:47 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x805303F4: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 1286 03:23:47 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x805303F4: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 553 03:23:47 INFO - PROCESS | 3752 | 1483615427991 Marionette TRACE conn4 <- [1,356,null,{"value":["/XMLHttpRequest/event-error-order.sub.html",0,null,null,[["XMLHttpRequest: event - error (order of events)",0,null,null]]]}] 03:23:47 INFO - . 03:23:47 INFO - TEST-OK | /XMLHttpRequest/event-error-order.sub.html | took 795ms 03:23:48 INFO - TEST-START | /XMLHttpRequest/event-error.sub.html 03:23:48 INFO - PROCESS | 3752 | 1483615428013 Marionette TRACE conn4 -> [0,357,"getWindowHandle",null] 03:23:48 INFO - PROCESS | 3752 | 1483615428016 Marionette TRACE conn4 <- [1,357,null,{"value":"12"}] 03:23:48 INFO - PROCESS | 3752 | 1483615428020 Marionette TRACE conn4 -> [0,358,"timeouts",{"script":35000}] 03:23:48 INFO - PROCESS | 3752 | 1483615428025 Marionette TRACE conn4 <- [1,358,null,{}] 03:23:48 INFO - PROCESS | 3752 | 1483615428039 Marionette TRACE conn4 -> [0,359,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:48 INFO - PROCESS | 3752 | 1483615428156 Marionette TRACE conn4 <- [1,359,null,{"value":null}] 03:23:48 INFO - PROCESS | 3752 | 1483615428222 Marionette TRACE conn4 -> [0,360,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-error.sub.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-error.sub.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:48 INFO - PROCESS | 3752 | ++DOCSHELL 1698A400 == 23 [pid = 3752] [id = 99] 03:23:48 INFO - PROCESS | 3752 | ++DOMWINDOW == 62 (16DD4800) [pid = 3752] [serial = 297] [outer = 00000000] 03:23:48 INFO - PROCESS | 3752 | ++DOMWINDOW == 63 (18437000) [pid = 3752] [serial = 298] [outer = 16DD4800] 03:23:48 INFO - PROCESS | 3752 | 1483615428294 Marionette DEBUG loaded listener.js 03:23:48 INFO - PROCESS | 3752 | ++DOMWINDOW == 64 (184BB000) [pid = 3752] [serial = 299] [outer = 16DD4800] 03:23:48 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x804B001E: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 553 03:23:48 INFO - PROCESS | 3752 | 1483615428870 Marionette TRACE conn4 <- [1,360,null,{"value":["/XMLHttpRequest/event-error.sub.html",0,null,null,[["XMLHttpRequest Test: event - error",0,null,null]]]}] 03:23:48 INFO - . 03:23:48 INFO - TEST-OK | /XMLHttpRequest/event-error.sub.html | took 904ms 03:23:48 INFO - PROCESS | 3752 | 1483615428923 Marionette TRACE conn4 -> [0,361,"getWindowHandle",null] 03:23:48 INFO - PROCESS | 3752 | 1483615428929 Marionette TRACE conn4 <- [1,361,null,{"value":"12"}] 03:23:48 INFO - TEST-START | /XMLHttpRequest/event-load.htm 03:23:48 INFO - PROCESS | 3752 | 1483615428935 Marionette TRACE conn4 -> [0,362,"timeouts",{"script":35000}] 03:23:48 INFO - PROCESS | 3752 | 1483615428939 Marionette TRACE conn4 <- [1,362,null,{}] 03:23:48 INFO - PROCESS | 3752 | 1483615428946 Marionette TRACE conn4 -> [0,363,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:49 INFO - PROCESS | 3752 | 1483615429135 Marionette TRACE conn4 <- [1,363,null,{"value":null}] 03:23:49 INFO - PROCESS | 3752 | 1483615429220 Marionette TRACE conn4 -> [0,364,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-load.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-load.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:49 INFO - PROCESS | 3752 | ++DOCSHELL 1110C800 == 24 [pid = 3752] [id = 100] 03:23:49 INFO - PROCESS | 3752 | ++DOMWINDOW == 65 (111D8000) [pid = 3752] [serial = 300] [outer = 00000000] 03:23:49 INFO - PROCESS | 3752 | ++DOMWINDOW == 66 (12DE0800) [pid = 3752] [serial = 301] [outer = 111D8000] 03:23:49 INFO - PROCESS | 3752 | 1483615429283 Marionette DEBUG loaded listener.js 03:23:49 INFO - PROCESS | 3752 | ++DOMWINDOW == 67 (0FE46800) [pid = 3752] [serial = 302] [outer = 111D8000] 03:23:49 INFO - PROCESS | 3752 | 1483615429701 Marionette TRACE conn4 <- [1,364,null,{"value":["/XMLHttpRequest/event-load.htm",0,null,null,[["XMLHttpRequest: The send() method: Fire an event named load (synchronous flag is unset)",0,null,null]]]}] 03:23:49 INFO - . 03:23:49 INFO - TEST-OK | /XMLHttpRequest/event-load.htm | took 811ms 03:23:49 INFO - PROCESS | 3752 | 1483615429735 Marionette TRACE conn4 -> [0,365,"getWindowHandle",null] 03:23:49 INFO - PROCESS | 3752 | 1483615429742 Marionette TRACE conn4 <- [1,365,null,{"value":"12"}] 03:23:49 INFO - PROCESS | 3752 | 1483615429749 Marionette TRACE conn4 -> [0,366,"timeouts",{"script":35000}] 03:23:49 INFO - TEST-START | /XMLHttpRequest/event-loadend.htm 03:23:49 INFO - PROCESS | 3752 | 1483615429753 Marionette TRACE conn4 <- [1,366,null,{}] 03:23:49 INFO - PROCESS | 3752 | 1483615429772 Marionette TRACE conn4 -> [0,367,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:49 INFO - PROCESS | 3752 | 1483615429909 Marionette TRACE conn4 <- [1,367,null,{"value":null}] 03:23:49 INFO - PROCESS | 3752 | 1483615429951 Marionette TRACE conn4 -> [0,368,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-loadend.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-loadend.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:49 INFO - PROCESS | 3752 | ++DOCSHELL 1289AC00 == 25 [pid = 3752] [id = 101] 03:23:49 INFO - PROCESS | 3752 | ++DOMWINDOW == 68 (12B26400) [pid = 3752] [serial = 303] [outer = 00000000] 03:23:49 INFO - PROCESS | 3752 | ++DOMWINDOW == 69 (140DF800) [pid = 3752] [serial = 304] [outer = 12B26400] 03:23:49 INFO - PROCESS | 3752 | 1483615430008 Marionette DEBUG loaded listener.js 03:23:50 INFO - PROCESS | 3752 | ++DOMWINDOW == 70 (13FF0400) [pid = 3752] [serial = 305] [outer = 12B26400] 03:23:50 INFO - PROCESS | 3752 | 1483615430325 Marionette TRACE conn4 <- [1,368,null,{"value":["/XMLHttpRequest/event-loadend.htm",0,null,null,[["XMLHttpRequest: loadend event",0,null,null]]]}] 03:23:50 INFO - . 03:23:50 INFO - TEST-OK | /XMLHttpRequest/event-loadend.htm | took 592ms 03:23:50 INFO - PROCESS | 3752 | 1483615430348 Marionette TRACE conn4 -> [0,369,"getWindowHandle",null] 03:23:50 INFO - PROCESS | 3752 | 1483615430351 Marionette TRACE conn4 <- [1,369,null,{"value":"12"}] 03:23:50 INFO - TEST-START | /XMLHttpRequest/event-loadstart.htm 03:23:50 INFO - PROCESS | 3752 | 1483615430356 Marionette TRACE conn4 -> [0,370,"timeouts",{"script":35000}] 03:23:50 INFO - PROCESS | 3752 | 1483615430360 Marionette TRACE conn4 <- [1,370,null,{}] 03:23:50 INFO - PROCESS | 3752 | 1483615430372 Marionette TRACE conn4 -> [0,371,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:50 INFO - PROCESS | 3752 | 1483615430469 Marionette TRACE conn4 <- [1,371,null,{"value":null}] 03:23:50 INFO - PROCESS | 3752 | 1483615430539 Marionette TRACE conn4 -> [0,372,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-loadstart.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-loadstart.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:50 INFO - PROCESS | 3752 | ++DOCSHELL 14B61400 == 26 [pid = 3752] [id = 102] 03:23:50 INFO - PROCESS | 3752 | ++DOMWINDOW == 71 (14B62800) [pid = 3752] [serial = 306] [outer = 00000000] 03:23:50 INFO - PROCESS | 3752 | ++DOMWINDOW == 72 (16783C00) [pid = 3752] [serial = 307] [outer = 14B62800] 03:23:50 INFO - PROCESS | 3752 | 1483615430597 Marionette DEBUG loaded listener.js 03:23:50 INFO - PROCESS | 3752 | ++DOMWINDOW == 73 (160D4400) [pid = 3752] [serial = 308] [outer = 14B62800] 03:23:50 INFO - PROCESS | 3752 | 1483615430914 Marionette TRACE conn4 <- [1,372,null,{"value":["/XMLHttpRequest/event-loadstart.htm",0,null,null,[["XMLHttpRequest: loadstart event",0,null,null]]]}] 03:23:50 INFO - . 03:23:50 INFO - TEST-OK | /XMLHttpRequest/event-loadstart.htm | took 592ms 03:23:50 INFO - PROCESS | 3752 | 1483615430950 Marionette TRACE conn4 -> [0,373,"getWindowHandle",null] 03:23:50 INFO - PROCESS | 3752 | 1483615430953 Marionette TRACE conn4 <- [1,373,null,{"value":"12"}] 03:23:50 INFO - TEST-START | /XMLHttpRequest/event-progress.htm 03:23:50 INFO - PROCESS | 3752 | 1483615430957 Marionette TRACE conn4 -> [0,374,"timeouts",{"script":35000}] 03:23:50 INFO - PROCESS | 3752 | 1483615430960 Marionette TRACE conn4 <- [1,374,null,{}] 03:23:50 INFO - PROCESS | 3752 | 1483615430949 Marionette TRACE conn4 -> [0,375,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:51 INFO - PROCESS | 3752 | 1483615431067 Marionette TRACE conn4 <- [1,375,null,{"value":null}] 03:23:51 INFO - PROCESS | 3752 | 1483615431075 Marionette TRACE conn4 -> [0,376,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-progress.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-progress.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:51 INFO - PROCESS | 3752 | ++DOCSHELL 16F05C00 == 27 [pid = 3752] [id = 103] 03:23:51 INFO - PROCESS | 3752 | ++DOMWINDOW == 74 (17AE1400) [pid = 3752] [serial = 309] [outer = 00000000] 03:23:51 INFO - PROCESS | 3752 | ++DOMWINDOW == 75 (17C9BC00) [pid = 3752] [serial = 310] [outer = 17AE1400] 03:23:51 INFO - PROCESS | 3752 | 1483615431130 Marionette DEBUG loaded listener.js 03:23:51 INFO - PROCESS | 3752 | ++DOMWINDOW == 76 (17C99C00) [pid = 3752] [serial = 311] [outer = 17AE1400] 03:23:52 INFO - PROCESS | 3752 | --DOMWINDOW == 75 (13FF2C00) [pid = 3752] [serial = 285] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/anonymous-mode-unsupported.htm] 03:23:52 INFO - PROCESS | 3752 | --DOMWINDOW == 74 (17AE0400) [pid = 3752] [serial = 279] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-abort.htm] 03:23:52 INFO - PROCESS | 3752 | --DOMWINDOW == 73 (11108C00) [pid = 3752] [serial = 252] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-done.htm] 03:23:52 INFO - PROCESS | 3752 | --DOMWINDOW == 72 (1698C800) [pid = 3752] [serial = 273] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-loadend.htm] 03:23:52 INFO - PROCESS | 3752 | --DOMWINDOW == 71 (16782C00) [pid = 3752] [serial = 270] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-listeners.htm] 03:23:52 INFO - PROCESS | 3752 | --DOMWINDOW == 70 (14B5C400) [pid = 3752] [serial = 264] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-upload.htm] 03:23:52 INFO - PROCESS | 3752 | --DOMWINDOW == 69 (1665CC00) [pid = 3752] [serial = 276] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-order.htm] 03:23:52 INFO - PROCESS | 3752 | --DOMWINDOW == 68 (1214A400) [pid = 3752] [serial = 255] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-open.htm] 03:23:52 INFO - PROCESS | 3752 | --DOMWINDOW == 67 (15F5D800) [pid = 3752] [serial = 267] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-abort.htm] 03:23:52 INFO - PROCESS | 3752 | --DOMWINDOW == 66 (12DE4800) [pid = 3752] [serial = 258] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-open.worker] 03:23:52 INFO - PROCESS | 3752 | --DOMWINDOW == 65 (13FEFC00) [pid = 3752] [serial = 261] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-unsent.htm] 03:23:52 INFO - PROCESS | 3752 | --DOMWINDOW == 64 (0F9C8000) [pid = 3752] [serial = 249] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-timeout.htm] 03:23:52 INFO - PROCESS | 3752 | --DOMWINDOW == 63 (17CA3400) [pid = 3752] [serial = 282] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-loadend.htm] 03:23:54 INFO - PROCESS | 3752 | 1483615434451 Marionette TRACE conn4 <- [1,376,null,{"value":["/XMLHttpRequest/event-progress.htm",0,null,null,[["XMLHttpRequest: The send() method: Fire a progress event named progress (synchronous flag is unset)",0,null,null]]]}] 03:23:54 INFO - . 03:23:54 INFO - TEST-OK | /XMLHttpRequest/event-progress.htm | took 3522ms 03:23:54 INFO - PROCESS | 3752 | 1483615434474 Marionette TRACE conn4 -> [0,377,"getWindowHandle",null] 03:23:54 INFO - PROCESS | 3752 | 1483615434477 Marionette TRACE conn4 <- [1,377,null,{"value":"12"}] 03:23:54 INFO - TEST-START | /XMLHttpRequest/event-readystate-sync-open.htm 03:23:54 INFO - PROCESS | 3752 | 1483615434481 Marionette TRACE conn4 -> [0,378,"timeouts",{"script":35000}] 03:23:54 INFO - PROCESS | 3752 | 1483615434483 Marionette TRACE conn4 <- [1,378,null,{}] 03:23:54 INFO - PROCESS | 3752 | 1483615434487 Marionette TRACE conn4 -> [0,379,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:54 INFO - PROCESS | 3752 | 1483615434574 Marionette TRACE conn4 <- [1,379,null,{"value":null}] 03:23:54 INFO - PROCESS | 3752 | 1483615434642 Marionette TRACE conn4 -> [0,380,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-readystate-sync-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-readystate-sync-open.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:54 INFO - PROCESS | 3752 | ++DOCSHELL 17C9B000 == 28 [pid = 3752] [id = 104] 03:23:54 INFO - PROCESS | 3752 | ++DOMWINDOW == 64 (17CA0C00) [pid = 3752] [serial = 312] [outer = 00000000] 03:23:54 INFO - PROCESS | 3752 | ++DOMWINDOW == 65 (184B8C00) [pid = 3752] [serial = 313] [outer = 17CA0C00] 03:23:54 INFO - PROCESS | 3752 | 1483615434696 Marionette DEBUG loaded listener.js 03:23:54 INFO - PROCESS | 3752 | ++DOMWINDOW == 66 (184B5C00) [pid = 3752] [serial = 314] [outer = 17CA0C00] 03:23:55 INFO - PROCESS | 3752 | 1483615435009 Marionette TRACE conn4 <- [1,380,null,{"value":["/XMLHttpRequest/event-readystate-sync-open.htm",0,null,null,[["XMLHttpRequest: open() call fires sync readystate event (sync)",0,null,null],["XMLHttpRequest: open() call fires sync readystate event (async)",0,null,null]]]}] 03:23:55 INFO - .. 03:23:55 INFO - TEST-OK | /XMLHttpRequest/event-readystate-sync-open.htm | took 593ms 03:23:55 INFO - PROCESS | 3752 | 1483615435076 Marionette TRACE conn4 -> [0,381,"getWindowHandle",null] 03:23:55 INFO - PROCESS | 3752 | 1483615435078 Marionette TRACE conn4 <- [1,381,null,{"value":"12"}] 03:23:55 INFO - TEST-START | /XMLHttpRequest/event-readystatechange-loaded.htm 03:23:55 INFO - PROCESS | 3752 | 1483615435082 Marionette TRACE conn4 -> [0,382,"timeouts",{"script":35000}] 03:23:55 INFO - PROCESS | 3752 | 1483615435084 Marionette TRACE conn4 <- [1,382,null,{}] 03:23:55 INFO - PROCESS | 3752 | 1483615435089 Marionette TRACE conn4 -> [0,383,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:23:55 INFO - PROCESS | 3752 | 1483615435226 Marionette TRACE conn4 <- [1,383,null,{"value":null}] 03:23:55 INFO - PROCESS | 3752 | 1483615435233 Marionette TRACE conn4 -> [0,384,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-readystatechange-loaded.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:23:55 INFO - PROCESS | 3752 | ++DOCSHELL 17A6D000 == 29 [pid = 3752] [id = 105] 03:23:55 INFO - PROCESS | 3752 | ++DOMWINDOW == 67 (17C9A400) [pid = 3752] [serial = 315] [outer = 00000000] 03:23:55 INFO - PROCESS | 3752 | ++DOMWINDOW == 68 (188F3C00) [pid = 3752] [serial = 316] [outer = 17C9A400] 03:23:55 INFO - PROCESS | 3752 | 1483615435288 Marionette DEBUG loaded listener.js 03:23:55 INFO - PROCESS | 3752 | ++DOMWINDOW == 69 (188F5400) [pid = 3752] [serial = 317] [outer = 17C9A400] 03:23:57 INFO - PROCESS | 3752 | --DOCSHELL 140C0800 == 28 [pid = 3752] [id = 82] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 68 (18441400) [pid = 3752] [serial = 286] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 67 (17C99400) [pid = 3752] [serial = 281] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 66 (116E2C00) [pid = 3752] [serial = 254] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 65 (16D0E000) [pid = 3752] [serial = 275] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 64 (168ADC00) [pid = 3752] [serial = 272] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 63 (160CF800) [pid = 3752] [serial = 266] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 62 (16FA4C00) [pid = 3752] [serial = 278] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 61 (12B2C000) [pid = 3752] [serial = 257] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 60 (16114400) [pid = 3752] [serial = 269] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 59 (13AE1800) [pid = 3752] [serial = 260] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 58 (1441E000) [pid = 3752] [serial = 263] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 57 (184BB400) [pid = 3752] [serial = 289] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 56 (184B5000) [pid = 3752] [serial = 287] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 55 (0FBB3800) [pid = 3752] [serial = 251] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 54 (18439000) [pid = 3752] [serial = 284] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 53 (1843CC00) [pid = 3752] [serial = 283] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 52 (17C98400) [pid = 3752] [serial = 280] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 51 (1734F800) [pid = 3752] [serial = 277] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 50 (16D0F400) [pid = 3752] [serial = 274] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 49 (168B8C00) [pid = 3752] [serial = 271] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 48 (160DE000) [pid = 3752] [serial = 268] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 47 (15F5D400) [pid = 3752] [serial = 265] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 46 (14425C00) [pid = 3752] [serial = 262] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 45 (13D7D400) [pid = 3752] [serial = 259] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 44 (12B1F000) [pid = 3752] [serial = 256] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 43 (11371400) [pid = 3752] [serial = 253] [outer = 00000000] [url = about:blank] 03:23:57 INFO - PROCESS | 3752 | --DOMWINDOW == 42 (0FB08400) [pid = 3752] [serial = 250] [outer = 00000000] [url = about:blank] 03:24:00 INFO - PROCESS | 3752 | --DOMWINDOW == 41 (140C3400) [pid = 3752] [serial = 288] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/data-uri.htm] 03:24:00 INFO - PROCESS | 3752 | --DOMWINDOW == 40 (1441FC00) [pid = 3752] [serial = 294] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-error-order.sub.html] 03:24:00 INFO - PROCESS | 3752 | --DOMWINDOW == 39 (14B62800) [pid = 3752] [serial = 306] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-loadstart.htm] 03:24:00 INFO - PROCESS | 3752 | --DOMWINDOW == 38 (11AFEC00) [pid = 3752] [serial = 291] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-abort.htm] 03:24:00 INFO - PROCESS | 3752 | --DOMWINDOW == 37 (12B26400) [pid = 3752] [serial = 303] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-loadend.htm] 03:24:00 INFO - PROCESS | 3752 | --DOMWINDOW == 36 (111D8000) [pid = 3752] [serial = 300] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-load.htm] 03:24:00 INFO - PROCESS | 3752 | --DOMWINDOW == 35 (16DD4800) [pid = 3752] [serial = 297] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-error.sub.html] 03:24:00 INFO - PROCESS | 3752 | --DOMWINDOW == 34 (17CA0C00) [pid = 3752] [serial = 312] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-readystate-sync-open.htm] 03:24:00 INFO - PROCESS | 3752 | --DOMWINDOW == 33 (17AE1400) [pid = 3752] [serial = 309] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-progress.htm] 03:24:00 INFO - PROCESS | 3752 | --DOMWINDOW == 32 (140C0C00) [pid = 3752] [serial = 246] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm] 03:24:01 INFO - PROCESS | 3752 | 1483615441588 Marionette TRACE conn4 <- [1,384,null,{"value":["/XMLHttpRequest/event-readystatechange-loaded.htm",0,null,null,[["XMLHttpRequest: the LOADING state change should only happen once",1,"assert_equals: LOADING state change may only be emitted once expected 1 but got 10","client.onreadystatechange<@http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm:29:13\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\nTest.prototype.step_func/<@http://web-platform.test:8000/resources/testharness.js:1427:20\n"]]]}] 03:24:01 INFO - . 03:24:01 INFO - TEST-OK | /XMLHttpRequest/event-readystatechange-loaded.htm | took 6560ms 03:24:01 INFO - PROCESS | 3752 | 1483615441646 Marionette TRACE conn4 -> [0,385,"getWindowHandle",null] 03:24:01 INFO - PROCESS | 3752 | 1483615441652 Marionette TRACE conn4 <- [1,385,null,{"value":"12"}] 03:24:01 INFO - TEST-START | /XMLHttpRequest/event-timeout-order.htm 03:24:01 INFO - PROCESS | 3752 | 1483615441659 Marionette TRACE conn4 -> [0,386,"timeouts",{"script":35000}] 03:24:01 INFO - PROCESS | 3752 | 1483615441664 Marionette TRACE conn4 <- [1,386,null,{}] 03:24:01 INFO - PROCESS | 3752 | 1483615441671 Marionette TRACE conn4 -> [0,387,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:01 INFO - PROCESS | 3752 | 1483615441777 Marionette TRACE conn4 <- [1,387,null,{"value":null}] 03:24:01 INFO - PROCESS | 3752 | 1483615441784 Marionette TRACE conn4 -> [0,388,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-timeout-order.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-timeout-order.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:01 INFO - PROCESS | 3752 | ++DOCSHELL 11551C00 == 29 [pid = 3752] [id = 106] 03:24:01 INFO - PROCESS | 3752 | ++DOMWINDOW == 33 (116E2C00) [pid = 3752] [serial = 318] [outer = 00000000] 03:24:01 INFO - PROCESS | 3752 | ++DOMWINDOW == 34 (11CA8C00) [pid = 3752] [serial = 319] [outer = 116E2C00] 03:24:01 INFO - PROCESS | 3752 | 1483615441845 Marionette DEBUG loaded listener.js 03:24:01 INFO - PROCESS | 3752 | ++DOMWINDOW == 35 (11CB7400) [pid = 3752] [serial = 320] [outer = 116E2C00] 03:24:02 INFO - PROCESS | 3752 | 1483615442230 Marionette TRACE conn4 <- [1,388,null,{"value":["/XMLHttpRequest/event-timeout-order.htm",0,null,null,[["XMLHttpRequest: event - timeout (order of events)",0,null,null]]]}] 03:24:02 INFO - . 03:24:02 INFO - TEST-OK | /XMLHttpRequest/event-timeout-order.htm | took 592ms 03:24:02 INFO - PROCESS | 3752 | 1483615442253 Marionette TRACE conn4 -> [0,389,"getWindowHandle",null] 03:24:02 INFO - PROCESS | 3752 | 1483615442261 Marionette TRACE conn4 <- [1,389,null,{"value":"12"}] 03:24:02 INFO - TEST-START | /XMLHttpRequest/event-timeout.htm 03:24:02 INFO - PROCESS | 3752 | 1483615442268 Marionette TRACE conn4 -> [0,390,"timeouts",{"script":35000}] 03:24:02 INFO - PROCESS | 3752 | 1483615442273 Marionette TRACE conn4 <- [1,390,null,{}] 03:24:02 INFO - PROCESS | 3752 | 1483615442276 Marionette TRACE conn4 -> [0,391,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:02 INFO - PROCESS | 3752 | 1483615442403 Marionette TRACE conn4 <- [1,391,null,{"value":null}] 03:24:02 INFO - PROCESS | 3752 | 1483615442411 Marionette TRACE conn4 -> [0,392,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-timeout.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-timeout.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:02 INFO - PROCESS | 3752 | ++DOCSHELL 12151800 == 30 [pid = 3752] [id = 107] 03:24:02 INFO - PROCESS | 3752 | ++DOMWINDOW == 36 (12155400) [pid = 3752] [serial = 321] [outer = 00000000] 03:24:02 INFO - PROCESS | 3752 | ++DOMWINDOW == 37 (12BFCC00) [pid = 3752] [serial = 322] [outer = 12155400] 03:24:02 INFO - PROCESS | 3752 | 1483615442470 Marionette DEBUG loaded listener.js 03:24:02 INFO - PROCESS | 3752 | ++DOMWINDOW == 38 (12BF8C00) [pid = 3752] [serial = 323] [outer = 12155400] 03:24:02 INFO - PROCESS | 3752 | 1483615442827 Marionette TRACE conn4 <- [1,392,null,{"value":["/XMLHttpRequest/event-timeout.htm",0,null,null,[["XMLHttpRequest: timeout event",0,null,null]]]}] 03:24:02 INFO - . 03:24:02 INFO - TEST-OK | /XMLHttpRequest/event-timeout.htm | took 593ms 03:24:02 INFO - TEST-START | /XMLHttpRequest/event-upload-progress-crossorigin.sub.htm 03:24:02 INFO - PROCESS | 3752 | 1483615442866 Marionette TRACE conn4 -> [0,393,"getWindowHandle",null] 03:24:02 INFO - PROCESS | 3752 | 1483615442869 Marionette TRACE conn4 <- [1,393,null,{"value":"12"}] 03:24:02 INFO - PROCESS | 3752 | 1483615442874 Marionette TRACE conn4 -> [0,394,"timeouts",{"script":35000}] 03:24:02 INFO - PROCESS | 3752 | 1483615442879 Marionette TRACE conn4 <- [1,394,null,{}] 03:24:02 INFO - PROCESS | 3752 | 1483615442892 Marionette TRACE conn4 -> [0,395,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:02 INFO - PROCESS | 3752 | 1483615443021 Marionette TRACE conn4 <- [1,395,null,{"value":null}] 03:24:03 INFO - PROCESS | 3752 | 1483615443062 Marionette TRACE conn4 -> [0,396,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:03 INFO - PROCESS | 3752 | ++DOCSHELL 140E8000 == 31 [pid = 3752] [id = 108] 03:24:03 INFO - PROCESS | 3752 | ++DOMWINDOW == 39 (140E9400) [pid = 3752] [serial = 324] [outer = 00000000] 03:24:03 INFO - PROCESS | 3752 | ++DOMWINDOW == 40 (1477B400) [pid = 3752] [serial = 325] [outer = 140E9400] 03:24:03 INFO - PROCESS | 3752 | 1483615443107 Marionette DEBUG loaded listener.js 03:24:03 INFO - PROCESS | 3752 | ++DOMWINDOW == 41 (13FEB400) [pid = 3752] [serial = 326] [outer = 140E9400] 03:24:03 INFO - PROCESS | 3752 | 1483615443425 Marionette TRACE conn4 <- [1,396,null,{"value":["/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm",0,null,null,[["XMLHttpRequest: upload progress event for cross-origin requests",0,null,null]]]}] 03:24:03 INFO - . 03:24:03 INFO - TEST-OK | /XMLHttpRequest/event-upload-progress-crossorigin.sub.htm | took 592ms 03:24:03 INFO - PROCESS | 3752 | 1483615443452 Marionette TRACE conn4 -> [0,397,"getWindowHandle",null] 03:24:03 INFO - PROCESS | 3752 | 1483615443455 Marionette TRACE conn4 <- [1,397,null,{"value":"12"}] 03:24:03 INFO - TEST-START | /XMLHttpRequest/event-upload-progress.htm 03:24:03 INFO - PROCESS | 3752 | 1483615443459 Marionette TRACE conn4 -> [0,398,"timeouts",{"script":35000}] 03:24:03 INFO - PROCESS | 3752 | 1483615443462 Marionette TRACE conn4 <- [1,398,null,{}] 03:24:03 INFO - PROCESS | 3752 | 1483615443466 Marionette TRACE conn4 -> [0,399,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:03 INFO - PROCESS | 3752 | 1483615443583 Marionette TRACE conn4 <- [1,399,null,{"value":null}] 03:24:03 INFO - PROCESS | 3752 | 1483615443591 Marionette TRACE conn4 -> [0,400,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-upload-progress.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-upload-progress.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:03 INFO - PROCESS | 3752 | ++DOCSHELL 15F62400 == 32 [pid = 3752] [id = 109] 03:24:03 INFO - PROCESS | 3752 | ++DOMWINDOW == 42 (15F6A400) [pid = 3752] [serial = 327] [outer = 00000000] 03:24:03 INFO - PROCESS | 3752 | ++DOMWINDOW == 43 (160DB800) [pid = 3752] [serial = 328] [outer = 15F6A400] 03:24:03 INFO - PROCESS | 3752 | 1483615443646 Marionette DEBUG loaded listener.js 03:24:03 INFO - PROCESS | 3752 | ++DOMWINDOW == 44 (160D8C00) [pid = 3752] [serial = 329] [outer = 15F6A400] 03:24:04 INFO - PROCESS | 3752 | 1483615444092 Marionette TRACE conn4 <- [1,400,null,{"value":["/XMLHttpRequest/event-upload-progress.htm",0,null,null,[["XMLHttpRequest: upload progress event",0,null,null]]]}] 03:24:04 INFO - . 03:24:04 INFO - TEST-OK | /XMLHttpRequest/event-upload-progress.htm | took 702ms 03:24:04 INFO - PROCESS | 3752 | 1483615444158 Marionette TRACE conn4 -> [0,401,"getWindowHandle",null] 03:24:04 INFO - PROCESS | 3752 | 1483615444164 Marionette TRACE conn4 <- [1,401,null,{"value":"12"}] 03:24:04 INFO - TEST-START | /XMLHttpRequest/formdata-blob.htm 03:24:04 INFO - PROCESS | 3752 | 1483615444213 Marionette TRACE conn4 -> [0,402,"timeouts",{"script":35000}] 03:24:04 INFO - PROCESS | 3752 | 1483615444218 Marionette TRACE conn4 <- [1,402,null,{}] 03:24:04 INFO - PROCESS | 3752 | 1483615444234 Marionette TRACE conn4 -> [0,403,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:04 INFO - PROCESS | 3752 | 1483615444359 Marionette TRACE conn4 <- [1,403,null,{"value":null}] 03:24:04 INFO - PROCESS | 3752 | 1483615444436 Marionette TRACE conn4 -> [0,404,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-blob.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-blob.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:04 INFO - PROCESS | 3752 | ++DOCSHELL 11E2B000 == 33 [pid = 3752] [id = 110] 03:24:04 INFO - PROCESS | 3752 | ++DOMWINDOW == 45 (11E2B800) [pid = 3752] [serial = 330] [outer = 00000000] 03:24:04 INFO - PROCESS | 3752 | ++DOMWINDOW == 46 (13FEEC00) [pid = 3752] [serial = 331] [outer = 11E2B800] 03:24:04 INFO - PROCESS | 3752 | 1483615444507 Marionette DEBUG loaded listener.js 03:24:04 INFO - PROCESS | 3752 | ++DOMWINDOW == 47 (140C3400) [pid = 3752] [serial = 332] [outer = 11E2B800] 03:24:04 INFO - PROCESS | 3752 | 1483615444926 Marionette TRACE conn4 <- [1,404,null,{"value":["/XMLHttpRequest/formdata-blob.htm",0,null,null,[["formdata with blob",0,null,null],["formdata with named blob",0,null,null],["formdata.append() should throw if value is string and file name is given",0,null,null]]]}] 03:24:04 INFO - ... 03:24:04 INFO - TEST-OK | /XMLHttpRequest/formdata-blob.htm | took 795ms 03:24:04 INFO - PROCESS | 3752 | 1483615444971 Marionette TRACE conn4 -> [0,405,"getWindowHandle",null] 03:24:04 INFO - PROCESS | 3752 | 1483615444978 Marionette TRACE conn4 <- [1,405,null,{"value":"12"}] 03:24:04 INFO - TEST-START | /XMLHttpRequest/formdata-delete.htm 03:24:04 INFO - PROCESS | 3752 | 1483615444986 Marionette TRACE conn4 -> [0,406,"timeouts",{"script":35000}] 03:24:04 INFO - PROCESS | 3752 | 1483615444991 Marionette TRACE conn4 <- [1,406,null,{}] 03:24:04 INFO - PROCESS | 3752 | 1483615444996 Marionette TRACE conn4 -> [0,407,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:05 INFO - PROCESS | 3752 | 1483615445142 Marionette TRACE conn4 <- [1,407,null,{"value":null}] 03:24:05 INFO - PROCESS | 3752 | 1483615445208 Marionette TRACE conn4 -> [0,408,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-delete.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-delete.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:05 INFO - PROCESS | 3752 | ++DOCSHELL 15E71C00 == 34 [pid = 3752] [id = 111] 03:24:05 INFO - PROCESS | 3752 | ++DOMWINDOW == 48 (15E78400) [pid = 3752] [serial = 333] [outer = 00000000] 03:24:05 INFO - PROCESS | 3752 | ++DOMWINDOW == 49 (1682E000) [pid = 3752] [serial = 334] [outer = 15E78400] 03:24:05 INFO - PROCESS | 3752 | 1483615445284 Marionette DEBUG loaded listener.js 03:24:05 INFO - PROCESS | 3752 | ++DOMWINDOW == 50 (16786400) [pid = 3752] [serial = 335] [outer = 15E78400] 03:24:05 INFO - PROCESS | 3752 | 1483615445671 Marionette TRACE conn4 <- [1,408,null,{"value":["/XMLHttpRequest/formdata-delete.htm",0,null,null,[["testFormDataDelete",0,null,null],["testFormDataDeleteFromForm",0,null,null],["testFormDataDeleteFromFormNonExistentKey",0,null,null],["testFormDataDeleteFromFormOtherKey",0,null,null],["testFormDataDeleteFromEmptyForm",0,null,null],["testFormDataDeleteNonExistentKey",0,null,null],["testFormDataDeleteOtherKey",0,null,null]]]}] 03:24:05 INFO - ....... 03:24:05 INFO - TEST-OK | /XMLHttpRequest/formdata-delete.htm | took 732ms 03:24:05 INFO - PROCESS | 3752 | 1483615445728 Marionette TRACE conn4 -> [0,409,"getWindowHandle",null] 03:24:05 INFO - PROCESS | 3752 | 1483615445731 Marionette TRACE conn4 <- [1,409,null,{"value":"12"}] 03:24:05 INFO - TEST-START | /XMLHttpRequest/formdata-get.htm 03:24:05 INFO - PROCESS | 3752 | 1483615445736 Marionette TRACE conn4 -> [0,410,"timeouts",{"script":35000}] 03:24:05 INFO - PROCESS | 3752 | 1483615445742 Marionette TRACE conn4 <- [1,410,null,{}] 03:24:05 INFO - PROCESS | 3752 | 1483615445796 Marionette TRACE conn4 -> [0,411,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:05 INFO - PROCESS | 3752 | 1483615445929 Marionette TRACE conn4 <- [1,411,null,{"value":null}] 03:24:06 INFO - PROCESS | 3752 | 1483615446017 Marionette TRACE conn4 -> [0,412,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-get.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-get.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:06 INFO - PROCESS | 3752 | ++DOCSHELL 1698F400 == 35 [pid = 3752] [id = 112] 03:24:06 INFO - PROCESS | 3752 | ++DOMWINDOW == 51 (16D03400) [pid = 3752] [serial = 336] [outer = 00000000] 03:24:06 INFO - PROCESS | 3752 | ++DOMWINDOW == 52 (17350000) [pid = 3752] [serial = 337] [outer = 16D03400] 03:24:06 INFO - PROCESS | 3752 | 1483615446084 Marionette DEBUG loaded listener.js 03:24:06 INFO - PROCESS | 3752 | ++DOMWINDOW == 53 (1735AC00) [pid = 3752] [serial = 338] [outer = 16D03400] 03:24:06 INFO - PROCESS | 3752 | 1483615446510 Marionette TRACE conn4 <- [1,412,null,{"value":["/XMLHttpRequest/formdata-get.htm",0,null,null,[["testFormDataGet",0,null,null],["testFormDataGetFromForm",0,null,null],["testFormDataGetFromFormNull",0,null,null],["testFormDataGetFromEmptyForm",0,null,null],["testFormDataGetNull1",0,null,null],["testFormDataGetNull2",0,null,null],["testFormDataGetAll",0,null,null],["testFormDataGetAllEmpty1",0,null,null],["testFormDataGetAllEmpty2",0,null,null],["testFormDataGetAllFromForm",0,null,null],["testFormDataGetAllFromFormNull",0,null,null],["testFormDataGetAllFromEmptyForm",0,null,null]]]}] 03:24:06 INFO - ............ 03:24:06 INFO - TEST-OK | /XMLHttpRequest/formdata-get.htm | took 794ms 03:24:06 INFO - PROCESS | 3752 | 1483615446540 Marionette TRACE conn4 -> [0,413,"getWindowHandle",null] 03:24:06 INFO - PROCESS | 3752 | 1483615446543 Marionette TRACE conn4 <- [1,413,null,{"value":"12"}] 03:24:06 INFO - TEST-START | /XMLHttpRequest/formdata-has.htm 03:24:06 INFO - PROCESS | 3752 | 1483615446548 Marionette TRACE conn4 -> [0,414,"timeouts",{"script":35000}] 03:24:06 INFO - PROCESS | 3752 | 1483615446552 Marionette TRACE conn4 <- [1,414,null,{}] 03:24:06 INFO - PROCESS | 3752 | 1483615446556 Marionette TRACE conn4 -> [0,415,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:06 INFO - PROCESS | 3752 | 1483615446679 Marionette TRACE conn4 <- [1,415,null,{"value":null}] 03:24:06 INFO - PROCESS | 3752 | 1483615446746 Marionette TRACE conn4 -> [0,416,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-has.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-has.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:06 INFO - PROCESS | 3752 | ++DOCSHELL 17ADEC00 == 36 [pid = 3752] [id = 113] 03:24:06 INFO - PROCESS | 3752 | ++DOMWINDOW == 54 (17AE0800) [pid = 3752] [serial = 339] [outer = 00000000] 03:24:06 INFO - PROCESS | 3752 | ++DOMWINDOW == 55 (1843A000) [pid = 3752] [serial = 340] [outer = 17AE0800] 03:24:06 INFO - PROCESS | 3752 | 1483615446810 Marionette DEBUG loaded listener.js 03:24:06 INFO - PROCESS | 3752 | ++DOMWINDOW == 56 (17AE6000) [pid = 3752] [serial = 341] [outer = 17AE0800] 03:24:07 INFO - PROCESS | 3752 | 1483615447194 Marionette TRACE conn4 <- [1,416,null,{"value":["/XMLHttpRequest/formdata-has.htm",0,null,null,[["testFormDataHas",0,null,null],["testFormDataHasFromForm",0,null,null],["testFormDataHasFromFormNull",0,null,null],["testFormDataHasFromEmptyForm",0,null,null],["testFormDataHasEmpty1",0,null,null],["testFormDataHasEmpty2",0,null,null]]]}] 03:24:07 INFO - ...... 03:24:07 INFO - TEST-OK | /XMLHttpRequest/formdata-has.htm | took 686ms 03:24:07 INFO - PROCESS | 3752 | 1483615447246 Marionette TRACE conn4 -> [0,417,"getWindowHandle",null] 03:24:07 INFO - PROCESS | 3752 | 1483615447248 Marionette TRACE conn4 <- [1,417,null,{"value":"12"}] 03:24:07 INFO - TEST-START | /XMLHttpRequest/formdata-set.htm 03:24:07 INFO - PROCESS | 3752 | 1483615447253 Marionette TRACE conn4 -> [0,418,"timeouts",{"script":35000}] 03:24:07 INFO - PROCESS | 3752 | 1483615447255 Marionette TRACE conn4 <- [1,418,null,{}] 03:24:07 INFO - PROCESS | 3752 | 1483615447260 Marionette TRACE conn4 -> [0,419,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:07 INFO - PROCESS | 3752 | 1483615447380 Marionette TRACE conn4 <- [1,419,null,{"value":null}] 03:24:07 INFO - PROCESS | 3752 | 1483615447446 Marionette TRACE conn4 -> [0,420,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-set.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-set.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:07 INFO - PROCESS | 3752 | ++DOCSHELL 184B5000 == 37 [pid = 3752] [id = 114] 03:24:07 INFO - PROCESS | 3752 | ++DOMWINDOW == 57 (184B7400) [pid = 3752] [serial = 342] [outer = 00000000] 03:24:07 INFO - PROCESS | 3752 | ++DOMWINDOW == 58 (184C2800) [pid = 3752] [serial = 343] [outer = 184B7400] 03:24:07 INFO - PROCESS | 3752 | 1483615447509 Marionette DEBUG loaded listener.js 03:24:07 INFO - PROCESS | 3752 | ++DOMWINDOW == 59 (184BB400) [pid = 3752] [serial = 344] [outer = 184B7400] 03:24:07 INFO - PROCESS | 3752 | 1483615448013 Marionette TRACE conn4 <- [1,420,null,{"value":["/XMLHttpRequest/formdata-set.htm",0,null,null,[["Passing a String object to FormData.set should work",0,null,null],["testFormDataSet1",0,null,null],["testFormDataSet2",0,null,null],["testFormDataSetUndefined1",0,null,null],["testFormDataSetUndefined2",0,null,null],["testFormDataSetNull1",0,null,null],["testFormDataSetNull2",0,null,null],["testFormDataSetToForm1",0,null,null],["testFormDataSetToForm2",0,null,null],["testFormDataSetToFormUndefined1",0,null,null],["testFormDataSetToFormUndefined2",0,null,null],["testFormDataSetToFormNull1",0,null,null],["testFormDataSetToFormNull2",0,null,null],["testFormDataSetEmptyBlob",0,null,null]]]}] 03:24:08 INFO - .............. 03:24:08 INFO - TEST-OK | /XMLHttpRequest/formdata-set.htm | took 795ms 03:24:08 INFO - PROCESS | 3752 | 1483615448054 Marionette TRACE conn4 -> [0,421,"getWindowHandle",null] 03:24:08 INFO - PROCESS | 3752 | 1483615448059 Marionette TRACE conn4 <- [1,421,null,{"value":"12"}] 03:24:08 INFO - TEST-START | /XMLHttpRequest/formdata.htm 03:24:08 INFO - PROCESS | 3752 | 1483615448067 Marionette TRACE conn4 -> [0,422,"timeouts",{"script":35000}] 03:24:08 INFO - PROCESS | 3752 | 1483615448071 Marionette TRACE conn4 <- [1,422,null,{}] 03:24:08 INFO - PROCESS | 3752 | 1483615448078 Marionette TRACE conn4 -> [0,423,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:08 INFO - PROCESS | 3752 | 1483615448254 Marionette TRACE conn4 <- [1,423,null,{"value":null}] 03:24:08 INFO - PROCESS | 3752 | 1483615448344 Marionette TRACE conn4 -> [0,424,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:08 INFO - PROCESS | 3752 | ++DOCSHELL 0F355400 == 38 [pid = 3752] [id = 115] 03:24:08 INFO - PROCESS | 3752 | ++DOMWINDOW == 60 (0F35BC00) [pid = 3752] [serial = 345] [outer = 00000000] 03:24:08 INFO - PROCESS | 3752 | ++DOMWINDOW == 61 (11294000) [pid = 3752] [serial = 346] [outer = 0F35BC00] 03:24:08 INFO - PROCESS | 3752 | 1483615448425 Marionette DEBUG loaded listener.js 03:24:08 INFO - PROCESS | 3752 | ++DOMWINDOW == 62 (1110BC00) [pid = 3752] [serial = 347] [outer = 0F35BC00] 03:24:08 INFO - PROCESS | 3752 | --DOCSHELL 140E8000 == 37 [pid = 3752] [id = 108] 03:24:08 INFO - PROCESS | 3752 | --DOCSHELL 12151800 == 36 [pid = 3752] [id = 107] 03:24:08 INFO - PROCESS | 3752 | --DOCSHELL 11551C00 == 35 [pid = 3752] [id = 106] 03:24:08 INFO - PROCESS | 3752 | --DOMWINDOW == 61 (184BA800) [pid = 3752] [serial = 290] [outer = 00000000] [url = about:blank] 03:24:08 INFO - PROCESS | 3752 | --DOMWINDOW == 60 (14BB7000) [pid = 3752] [serial = 296] [outer = 00000000] [url = about:blank] 03:24:08 INFO - PROCESS | 3752 | --DOMWINDOW == 59 (160D4400) [pid = 3752] [serial = 308] [outer = 00000000] [url = about:blank] 03:24:08 INFO - PROCESS | 3752 | --DOMWINDOW == 58 (12DE0C00) [pid = 3752] [serial = 293] [outer = 00000000] [url = about:blank] 03:24:08 INFO - PROCESS | 3752 | --DOMWINDOW == 57 (13FF0400) [pid = 3752] [serial = 305] [outer = 00000000] [url = about:blank] 03:24:08 INFO - PROCESS | 3752 | --DOMWINDOW == 56 (0FE46800) [pid = 3752] [serial = 302] [outer = 00000000] [url = about:blank] 03:24:08 INFO - PROCESS | 3752 | --DOMWINDOW == 55 (184BB000) [pid = 3752] [serial = 299] [outer = 00000000] [url = about:blank] 03:24:08 INFO - PROCESS | 3752 | --DOMWINDOW == 54 (184B8C00) [pid = 3752] [serial = 313] [outer = 00000000] [url = about:blank] 03:24:08 INFO - PROCESS | 3752 | --DOMWINDOW == 53 (184B5C00) [pid = 3752] [serial = 314] [outer = 00000000] [url = about:blank] 03:24:08 INFO - PROCESS | 3752 | --DOMWINDOW == 52 (17C99C00) [pid = 3752] [serial = 311] [outer = 00000000] [url = about:blank] 03:24:08 INFO - PROCESS | 3752 | --DOMWINDOW == 51 (188F3C00) [pid = 3752] [serial = 316] [outer = 00000000] [url = about:blank] 03:24:08 INFO - PROCESS | 3752 | --DOMWINDOW == 50 (17C9BC00) [pid = 3752] [serial = 310] [outer = 00000000] [url = about:blank] 03:24:08 INFO - PROCESS | 3752 | --DOMWINDOW == 49 (16783C00) [pid = 3752] [serial = 307] [outer = 00000000] [url = about:blank] 03:24:08 INFO - PROCESS | 3752 | --DOMWINDOW == 48 (140DF800) [pid = 3752] [serial = 304] [outer = 00000000] [url = about:blank] 03:24:08 INFO - PROCESS | 3752 | --DOMWINDOW == 47 (12DE0800) [pid = 3752] [serial = 301] [outer = 00000000] [url = about:blank] 03:24:08 INFO - PROCESS | 3752 | --DOMWINDOW == 46 (18437000) [pid = 3752] [serial = 298] [outer = 00000000] [url = about:blank] 03:24:08 INFO - PROCESS | 3752 | --DOMWINDOW == 45 (15DDF400) [pid = 3752] [serial = 295] [outer = 00000000] [url = about:blank] 03:24:08 INFO - PROCESS | 3752 | --DOMWINDOW == 44 (12DE7400) [pid = 3752] [serial = 292] [outer = 00000000] [url = about:blank] 03:24:08 INFO - PROCESS | 3752 | --DOMWINDOW == 43 (13D78400) [pid = 3752] [serial = 248] [outer = 00000000] [url = about:blank] 03:24:08 INFO - PROCESS | 3752 | 1483615448818 Marionette TRACE conn4 <- [1,424,null,{"value":["/XMLHttpRequest/formdata.htm",0,null,null,[["empty formdata",0,null,null],["formdata with string",0,null,null],["formdata with named string",0,null,null],["formdata from form",0,null,null]]]}] 03:24:08 INFO - .... 03:24:08 INFO - TEST-OK | /XMLHttpRequest/formdata.htm | took 795ms 03:24:08 INFO - PROCESS | 3752 | 1483615448867 Marionette TRACE conn4 -> [0,425,"getWindowHandle",null] 03:24:08 INFO - PROCESS | 3752 | 1483615448873 Marionette TRACE conn4 <- [1,425,null,{"value":"12"}] 03:24:08 INFO - PROCESS | 3752 | 1483615448880 Marionette TRACE conn4 -> [0,426,"timeouts",{"script":35000}] 03:24:08 INFO - TEST-START | /XMLHttpRequest/getallresponseheaders-cookies.htm 03:24:08 INFO - PROCESS | 3752 | 1483615448884 Marionette TRACE conn4 <- [1,426,null,{}] 03:24:08 INFO - PROCESS | 3752 | 1483615448888 Marionette TRACE conn4 -> [0,427,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:08 INFO - PROCESS | 3752 | 1483615448983 Marionette TRACE conn4 <- [1,427,null,{"value":null}] 03:24:09 INFO - PROCESS | 3752 | 1483615449050 Marionette TRACE conn4 -> [0,428,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getallresponseheaders-cookies.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-cookies.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:09 INFO - PROCESS | 3752 | ++DOCSHELL 0FED7800 == 36 [pid = 3752] [id = 116] 03:24:09 INFO - PROCESS | 3752 | ++DOMWINDOW == 44 (1124E800) [pid = 3752] [serial = 348] [outer = 00000000] 03:24:09 INFO - PROCESS | 3752 | ++DOMWINDOW == 45 (13FEE000) [pid = 3752] [serial = 349] [outer = 1124E800] 03:24:09 INFO - PROCESS | 3752 | 1483615449108 Marionette DEBUG loaded listener.js 03:24:09 INFO - PROCESS | 3752 | ++DOMWINDOW == 46 (13FE8000) [pid = 3752] [serial = 350] [outer = 1124E800] 03:24:09 INFO - PROCESS | 3752 | [3752] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1082 03:24:09 INFO - PROCESS | 3752 | [3752] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1082 03:24:09 INFO - PROCESS | 3752 | [3752] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1082 03:24:09 INFO - PROCESS | 3752 | [3752] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1082 03:24:09 INFO - PROCESS | 3752 | [3752] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1082 03:24:09 INFO - PROCESS | 3752 | [3752] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1082 03:24:09 INFO - PROCESS | 3752 | 1483615449431 Marionette TRACE conn4 <- [1,428,null,{"value":["/XMLHttpRequest/getallresponseheaders-cookies.htm",0,null,null,[["XMLHttpRequest: getAllResponseHeaders() excludes cookies",0,null,null]]]}] 03:24:09 INFO - . 03:24:09 INFO - TEST-OK | /XMLHttpRequest/getallresponseheaders-cookies.htm | took 592ms 03:24:09 INFO - PROCESS | 3752 | 1483615449464 Marionette TRACE conn4 -> [0,429,"getWindowHandle",null] 03:24:09 INFO - PROCESS | 3752 | 1483615449467 Marionette TRACE conn4 <- [1,429,null,{"value":"12"}] 03:24:09 INFO - TEST-START | /XMLHttpRequest/getallresponseheaders-status.htm 03:24:09 INFO - PROCESS | 3752 | 1483615449470 Marionette TRACE conn4 -> [0,430,"timeouts",{"script":35000}] 03:24:09 INFO - PROCESS | 3752 | 1483615449475 Marionette TRACE conn4 <- [1,430,null,{}] 03:24:09 INFO - PROCESS | 3752 | 1483615449487 Marionette TRACE conn4 -> [0,431,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:09 INFO - PROCESS | 3752 | 1483615449586 Marionette TRACE conn4 <- [1,431,null,{"value":null}] 03:24:09 INFO - PROCESS | 3752 | 1483615449652 Marionette TRACE conn4 -> [0,432,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getallresponseheaders-status.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-status.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:09 INFO - PROCESS | 3752 | ++DOCSHELL 160D4400 == 37 [pid = 3752] [id = 117] 03:24:09 INFO - PROCESS | 3752 | ++DOMWINDOW == 47 (160D8800) [pid = 3752] [serial = 351] [outer = 00000000] 03:24:09 INFO - PROCESS | 3752 | ++DOMWINDOW == 48 (16D03C00) [pid = 3752] [serial = 352] [outer = 160D8800] 03:24:09 INFO - PROCESS | 3752 | 1483615449710 Marionette DEBUG loaded listener.js 03:24:09 INFO - PROCESS | 3752 | ++DOMWINDOW == 49 (168BC800) [pid = 3752] [serial = 353] [outer = 160D8800] 03:24:09 INFO - PROCESS | 3752 | [3752] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1082 03:24:09 INFO - PROCESS | 3752 | [3752] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1082 03:24:09 INFO - PROCESS | 3752 | [3752] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1082 03:24:09 INFO - PROCESS | 3752 | [3752] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1082 03:24:09 INFO - PROCESS | 3752 | [3752] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1082 03:24:09 INFO - PROCESS | 3752 | [3752] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1082 03:24:10 INFO - PROCESS | 3752 | 1483615450035 Marionette TRACE conn4 <- [1,432,null,{"value":["/XMLHttpRequest/getallresponseheaders-status.htm",0,null,null,[["XMLHttpRequest: getAllResponseHeaders() excludes status",0,null,null]]]}] 03:24:10 INFO - . 03:24:10 INFO - TEST-OK | /XMLHttpRequest/getallresponseheaders-status.htm | took 592ms 03:24:10 INFO - PROCESS | 3752 | 1483615450066 Marionette TRACE conn4 -> [0,433,"getWindowHandle",null] 03:24:10 INFO - PROCESS | 3752 | 1483615450068 Marionette TRACE conn4 <- [1,433,null,{"value":"12"}] 03:24:10 INFO - TEST-START | /XMLHttpRequest/getresponseheader-case-insensitive.htm 03:24:10 INFO - PROCESS | 3752 | 1483615450072 Marionette TRACE conn4 -> [0,434,"timeouts",{"script":35000}] 03:24:10 INFO - PROCESS | 3752 | 1483615450076 Marionette TRACE conn4 <- [1,434,null,{}] 03:24:10 INFO - PROCESS | 3752 | 1483615450079 Marionette TRACE conn4 -> [0,435,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:10 INFO - PROCESS | 3752 | 1483615450210 Marionette TRACE conn4 <- [1,435,null,{"value":null}] 03:24:10 INFO - PROCESS | 3752 | 1483615450252 Marionette TRACE conn4 -> [0,436,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-case-insensitive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-case-insensitive.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:10 INFO - PROCESS | 3752 | ++DOCSHELL 1735A000 == 38 [pid = 3752] [id = 118] 03:24:10 INFO - PROCESS | 3752 | ++DOMWINDOW == 50 (17A64800) [pid = 3752] [serial = 354] [outer = 00000000] 03:24:10 INFO - PROCESS | 3752 | ++DOMWINDOW == 51 (17CA5000) [pid = 3752] [serial = 355] [outer = 17A64800] 03:24:10 INFO - PROCESS | 3752 | 1483615450307 Marionette DEBUG loaded listener.js 03:24:10 INFO - PROCESS | 3752 | ++DOMWINDOW == 52 (17C9DC00) [pid = 3752] [serial = 356] [outer = 17A64800] 03:24:10 INFO - PROCESS | 3752 | 1483615450666 Marionette TRACE conn4 <- [1,436,null,{"value":["/XMLHttpRequest/getresponseheader-case-insensitive.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() case-insensitive matching",0,null,null]]]}] 03:24:10 INFO - . 03:24:10 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-case-insensitive.htm | took 624ms 03:24:10 INFO - TEST-START | /XMLHttpRequest/getresponseheader-chunked-trailer.htm 03:24:10 INFO - PROCESS | 3752 | 1483615450710 Marionette TRACE conn4 -> [0,437,"getWindowHandle",null] 03:24:10 INFO - PROCESS | 3752 | 1483615450712 Marionette TRACE conn4 <- [1,437,null,{"value":"12"}] 03:24:10 INFO - PROCESS | 3752 | 1483615450715 Marionette TRACE conn4 -> [0,438,"timeouts",{"script":35000}] 03:24:10 INFO - PROCESS | 3752 | 1483615450718 Marionette TRACE conn4 <- [1,438,null,{}] 03:24:10 INFO - PROCESS | 3752 | 1483615450721 Marionette TRACE conn4 -> [0,439,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:10 INFO - PROCESS | 3752 | 1483615450835 Marionette TRACE conn4 <- [1,439,null,{"value":null}] 03:24:10 INFO - PROCESS | 3752 | 1483615450840 Marionette TRACE conn4 -> [0,440,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-chunked-trailer.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-chunked-trailer.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:10 INFO - PROCESS | 3752 | ++DOCSHELL 15F60000 == 39 [pid = 3752] [id = 119] 03:24:10 INFO - PROCESS | 3752 | ++DOMWINDOW == 53 (17CA5C00) [pid = 3752] [serial = 357] [outer = 00000000] 03:24:10 INFO - PROCESS | 3752 | ++DOMWINDOW == 54 (18696400) [pid = 3752] [serial = 358] [outer = 17CA5C00] 03:24:10 INFO - PROCESS | 3752 | 1483615450894 Marionette DEBUG loaded listener.js 03:24:10 INFO - PROCESS | 3752 | ++DOMWINDOW == 55 (18694800) [pid = 3752] [serial = 359] [outer = 17CA5C00] 03:24:11 INFO - PROCESS | 3752 | --DOMWINDOW == 54 (12155400) [pid = 3752] [serial = 321] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-timeout.htm] 03:24:11 INFO - PROCESS | 3752 | --DOMWINDOW == 53 (116E2C00) [pid = 3752] [serial = 318] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-timeout-order.htm] 03:24:11 INFO - PROCESS | 3752 | --DOMWINDOW == 52 (140E9400) [pid = 3752] [serial = 324] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm] 03:24:11 INFO - PROCESS | 3752 | 1483615451241 Marionette TRACE conn4 <- [1,440,null,{"value":["/XMLHttpRequest/getresponseheader-chunked-trailer.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() and HTTP trailer",0,null,null]]]}] 03:24:11 INFO - . 03:24:11 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-chunked-trailer.htm | took 530ms 03:24:11 INFO - PROCESS | 3752 | 1483615451250 Marionette TRACE conn4 -> [0,441,"getWindowHandle",null] 03:24:11 INFO - PROCESS | 3752 | 1483615451253 Marionette TRACE conn4 <- [1,441,null,{"value":"12"}] 03:24:11 INFO - TEST-START | /XMLHttpRequest/getresponseheader-cookies-and-more.htm 03:24:11 INFO - PROCESS | 3752 | 1483615451257 Marionette TRACE conn4 -> [0,442,"timeouts",{"script":35000}] 03:24:11 INFO - PROCESS | 3752 | 1483615451259 Marionette TRACE conn4 <- [1,442,null,{}] 03:24:11 INFO - PROCESS | 3752 | 1483615451262 Marionette TRACE conn4 -> [0,443,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:11 INFO - PROCESS | 3752 | 1483615451374 Marionette TRACE conn4 <- [1,443,null,{"value":null}] 03:24:11 INFO - PROCESS | 3752 | 1483615451448 Marionette TRACE conn4 -> [0,444,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-cookies-and-more.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-cookies-and-more.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:11 INFO - PROCESS | 3752 | ++DOCSHELL 12DE3400 == 40 [pid = 3752] [id = 120] 03:24:11 INFO - PROCESS | 3752 | ++DOMWINDOW == 53 (13FE7000) [pid = 3752] [serial = 360] [outer = 00000000] 03:24:11 INFO - PROCESS | 3752 | ++DOMWINDOW == 54 (189D9400) [pid = 3752] [serial = 361] [outer = 13FE7000] 03:24:11 INFO - PROCESS | 3752 | 1483615451504 Marionette DEBUG loaded listener.js 03:24:11 INFO - PROCESS | 3752 | ++DOMWINDOW == 55 (189D6800) [pid = 3752] [serial = 362] [outer = 13FE7000] 03:24:11 INFO - PROCESS | 3752 | [3752] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1082 03:24:11 INFO - PROCESS | 3752 | [3752] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1082 03:24:11 INFO - PROCESS | 3752 | [3752] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1082 03:24:11 INFO - PROCESS | 3752 | [3752] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1082 03:24:11 INFO - PROCESS | 3752 | [3752] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1082 03:24:11 INFO - PROCESS | 3752 | [3752] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1082 03:24:11 INFO - PROCESS | 3752 | 1483615451782 Marionette TRACE conn4 <- [1,444,null,{"value":["/XMLHttpRequest/getresponseheader-cookies-and-more.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() custom/non-existent headers and cookies",0,null,null]]]}] 03:24:11 INFO - . 03:24:11 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-cookies-and-more.htm | took 530ms 03:24:11 INFO - PROCESS | 3752 | 1483615451792 Marionette TRACE conn4 -> [0,445,"getWindowHandle",null] 03:24:11 INFO - PROCESS | 3752 | 1483615451794 Marionette TRACE conn4 <- [1,445,null,{"value":"12"}] 03:24:11 INFO - TEST-START | /XMLHttpRequest/getresponseheader-error-state.htm 03:24:11 INFO - PROCESS | 3752 | 1483615451798 Marionette TRACE conn4 -> [0,446,"timeouts",{"script":35000}] 03:24:11 INFO - PROCESS | 3752 | 1483615451799 Marionette TRACE conn4 <- [1,446,null,{}] 03:24:11 INFO - PROCESS | 3752 | 1483615451803 Marionette TRACE conn4 -> [0,447,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:11 INFO - PROCESS | 3752 | 1483615451887 Marionette TRACE conn4 <- [1,447,null,{"value":null}] 03:24:11 INFO - PROCESS | 3752 | 1483615451893 Marionette TRACE conn4 -> [0,448,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-error-state.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-error-state.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:11 INFO - PROCESS | 3752 | ++DOCSHELL 18699000 == 41 [pid = 3752] [id = 121] 03:24:11 INFO - PROCESS | 3752 | ++DOMWINDOW == 56 (189DE800) [pid = 3752] [serial = 363] [outer = 00000000] 03:24:11 INFO - PROCESS | 3752 | ++DOMWINDOW == 57 (19223800) [pid = 3752] [serial = 364] [outer = 189DE800] 03:24:11 INFO - PROCESS | 3752 | 1483615451943 Marionette DEBUG loaded listener.js 03:24:12 INFO - PROCESS | 3752 | ++DOMWINDOW == 58 (19221400) [pid = 3752] [serial = 365] [outer = 189DE800] 03:24:12 INFO - PROCESS | 3752 | 1483615452283 Marionette TRACE conn4 <- [1,448,null,{"value":["/XMLHttpRequest/getresponseheader-error-state.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() in error state (failing cross-origin test)",0,null,null]]]}] 03:24:12 INFO - . 03:24:12 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-error-state.htm | took 530ms 03:24:12 INFO - PROCESS | 3752 | 1483615452333 Marionette TRACE conn4 -> [0,449,"getWindowHandle",null] 03:24:12 INFO - PROCESS | 3752 | 1483615452335 Marionette TRACE conn4 <- [1,449,null,{"value":"12"}] 03:24:12 INFO - PROCESS | 3752 | 1483615452339 Marionette TRACE conn4 -> [0,450,"timeouts",{"script":35000}] 03:24:12 INFO - TEST-START | /XMLHttpRequest/getresponseheader-server-date.htm 03:24:12 INFO - PROCESS | 3752 | 1483615452340 Marionette TRACE conn4 <- [1,450,null,{}] 03:24:12 INFO - PROCESS | 3752 | 1483615452344 Marionette TRACE conn4 -> [0,451,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:12 INFO - PROCESS | 3752 | 1483615452465 Marionette TRACE conn4 <- [1,451,null,{"value":null}] 03:24:12 INFO - PROCESS | 3752 | 1483615452472 Marionette TRACE conn4 -> [0,452,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-server-date.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-server-date.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:12 INFO - PROCESS | 3752 | ++DOCSHELL 168B5000 == 42 [pid = 3752] [id = 122] 03:24:12 INFO - PROCESS | 3752 | ++DOMWINDOW == 59 (18B72800) [pid = 3752] [serial = 366] [outer = 00000000] 03:24:12 INFO - PROCESS | 3752 | ++DOMWINDOW == 60 (194C2800) [pid = 3752] [serial = 367] [outer = 18B72800] 03:24:12 INFO - PROCESS | 3752 | 1483615452526 Marionette DEBUG loaded listener.js 03:24:12 INFO - PROCESS | 3752 | ++DOMWINDOW == 61 (194C3C00) [pid = 3752] [serial = 368] [outer = 18B72800] 03:24:12 INFO - PROCESS | 3752 | 1483615452856 Marionette TRACE conn4 <- [1,452,null,{"value":["/XMLHttpRequest/getresponseheader-server-date.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() server and date",0,null,null]]]}] 03:24:12 INFO - . 03:24:12 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-server-date.htm | took 530ms 03:24:12 INFO - PROCESS | 3752 | 1483615452873 Marionette TRACE conn4 -> [0,453,"getWindowHandle",null] 03:24:12 INFO - PROCESS | 3752 | 1483615452876 Marionette TRACE conn4 <- [1,453,null,{"value":"12"}] 03:24:12 INFO - TEST-START | /XMLHttpRequest/getresponseheader-special-characters.htm 03:24:12 INFO - PROCESS | 3752 | 1483615452880 Marionette TRACE conn4 -> [0,454,"timeouts",{"script":35000}] 03:24:12 INFO - PROCESS | 3752 | 1483615452881 Marionette TRACE conn4 <- [1,454,null,{}] 03:24:12 INFO - PROCESS | 3752 | 1483615452885 Marionette TRACE conn4 -> [0,455,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:12 INFO - PROCESS | 3752 | 1483615452972 Marionette TRACE conn4 <- [1,455,null,{"value":null}] 03:24:12 INFO - PROCESS | 3752 | 1483615452978 Marionette TRACE conn4 -> [0,456,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-special-characters.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-special-characters.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:12 INFO - PROCESS | 3752 | ++DOCSHELL 14498400 == 43 [pid = 3752] [id = 123] 03:24:12 INFO - PROCESS | 3752 | ++DOMWINDOW == 62 (160D8400) [pid = 3752] [serial = 369] [outer = 00000000] 03:24:13 INFO - PROCESS | 3752 | ++DOMWINDOW == 63 (19AC0400) [pid = 3752] [serial = 370] [outer = 160D8400] 03:24:13 INFO - PROCESS | 3752 | 1483615453028 Marionette DEBUG loaded listener.js 03:24:13 INFO - PROCESS | 3752 | ++DOMWINDOW == 64 (19ABF800) [pid = 3752] [serial = 371] [outer = 160D8400] 03:24:13 INFO - PROCESS | 3752 | 1483615453369 Marionette TRACE conn4 <- [1,456,null,{"value":["/XMLHttpRequest/getresponseheader-special-characters.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() funny characters",0,null,null]]]}] 03:24:13 INFO - . 03:24:13 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-special-characters.htm | took 530ms 03:24:13 INFO - PROCESS | 3752 | 1483615453415 Marionette TRACE conn4 -> [0,457,"getWindowHandle",null] 03:24:13 INFO - PROCESS | 3752 | 1483615453417 Marionette TRACE conn4 <- [1,457,null,{"value":"12"}] 03:24:13 INFO - TEST-START | /XMLHttpRequest/getresponseheader-unsent-opened-state.htm 03:24:13 INFO - PROCESS | 3752 | 1483615453420 Marionette TRACE conn4 -> [0,458,"timeouts",{"script":35000}] 03:24:13 INFO - PROCESS | 3752 | 1483615453422 Marionette TRACE conn4 <- [1,458,null,{}] 03:24:13 INFO - PROCESS | 3752 | 1483615453426 Marionette TRACE conn4 -> [0,459,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:13 INFO - PROCESS | 3752 | 1483615453551 Marionette TRACE conn4 <- [1,459,null,{"value":null}] 03:24:13 INFO - PROCESS | 3752 | 1483615453560 Marionette TRACE conn4 -> [0,460,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-unsent-opened-state.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-unsent-opened-state.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:13 INFO - PROCESS | 3752 | ++DOCSHELL 16320800 == 44 [pid = 3752] [id = 124] 03:24:13 INFO - PROCESS | 3752 | ++DOMWINDOW == 65 (19ABA000) [pid = 3752] [serial = 372] [outer = 00000000] 03:24:13 INFO - PROCESS | 3752 | ++DOMWINDOW == 66 (1A2E7000) [pid = 3752] [serial = 373] [outer = 19ABA000] 03:24:13 INFO - PROCESS | 3752 | 1483615453612 Marionette DEBUG loaded listener.js 03:24:13 INFO - PROCESS | 3752 | ++DOMWINDOW == 67 (1A2E6400) [pid = 3752] [serial = 374] [outer = 19ABA000] 03:24:13 INFO - PROCESS | 3752 | 1483615453968 Marionette TRACE conn4 <- [1,460,null,{"value":["/XMLHttpRequest/getresponseheader-unsent-opened-state.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() in unsent, opened states",0,null,null]]]}] 03:24:13 INFO - . 03:24:13 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-unsent-opened-state.htm | took 592ms 03:24:13 INFO - PROCESS | 3752 | 1483615454017 Marionette TRACE conn4 -> [0,461,"getWindowHandle",null] 03:24:13 INFO - PROCESS | 3752 | 1483615454020 Marionette TRACE conn4 <- [1,461,null,{"value":"12"}] 03:24:13 INFO - TEST-START | /XMLHttpRequest/headers-normalize-response.htm 03:24:14 INFO - PROCESS | 3752 | 1483615454024 Marionette TRACE conn4 -> [0,462,"timeouts",{"script":35000}] 03:24:14 INFO - PROCESS | 3752 | 1483615454026 Marionette TRACE conn4 <- [1,462,null,{}] 03:24:14 INFO - PROCESS | 3752 | 1483615454029 Marionette TRACE conn4 -> [0,463,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:14 INFO - PROCESS | 3752 | 1483615454131 Marionette TRACE conn4 <- [1,463,null,{"value":null}] 03:24:14 INFO - PROCESS | 3752 | 1483615454136 Marionette TRACE conn4 -> [0,464,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/headers-normalize-response.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/headers-normalize-response.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:14 INFO - PROCESS | 3752 | ++DOCSHELL 160D4800 == 45 [pid = 3752] [id = 125] 03:24:14 INFO - PROCESS | 3752 | ++DOMWINDOW == 68 (1A2EB000) [pid = 3752] [serial = 375] [outer = 00000000] 03:24:14 INFO - PROCESS | 3752 | ++DOMWINDOW == 69 (1A699400) [pid = 3752] [serial = 376] [outer = 1A2EB000] 03:24:14 INFO - PROCESS | 3752 | 1483615454191 Marionette DEBUG loaded listener.js 03:24:14 INFO - PROCESS | 3752 | ++DOMWINDOW == 70 (1A69A800) [pid = 3752] [serial = 377] [outer = 1A2EB000] 03:24:14 INFO - PROCESS | 3752 | 1483615454797 Marionette TRACE conn4 <- [1,464,null,{"value":["/XMLHttpRequest/headers-normalize-response.htm",0,null,null,[["Header value: hello_world\\0",0,null,null],["Header value: \\0hello_world",0,null,null],["Header value: hello\\0world",0,null,null],["Header value: __hello_world",0,null,null],["Header value: hello_world__",0,null,null],["Header value: __hello_world__",0,null,null],["Header value: [tab]hello_world",0,null,null],["Header value: hello_world[tab]",0,null,null],["Header value: [tab]hello_world[tab]",0,null,null],["Header value: hello______world",0,null,null],["Header value: hello[tab]world",0,null,null],["Header value: \\0",0,null,null],["Header value: ___",0,null,null],["Header value: [tab]",0,null,null],["Header value: ",0,null,null]]]}] 03:24:14 INFO - ............... 03:24:14 INFO - TEST-OK | /XMLHttpRequest/headers-normalize-response.htm | took 811ms 03:24:14 INFO - PROCESS | 3752 | 1483615454828 Marionette TRACE conn4 -> [0,465,"getWindowHandle",null] 03:24:14 INFO - PROCESS | 3752 | 1483615454833 Marionette TRACE conn4 <- [1,465,null,{"value":"12"}] 03:24:14 INFO - TEST-START | /XMLHttpRequest/interfaces.html 03:24:14 INFO - PROCESS | 3752 | 1483615454841 Marionette TRACE conn4 -> [0,466,"timeouts",{"script":35000}] 03:24:14 INFO - PROCESS | 3752 | 1483615454847 Marionette TRACE conn4 <- [1,466,null,{}] 03:24:14 INFO - PROCESS | 3752 | 1483615454857 Marionette TRACE conn4 -> [0,467,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:14 INFO - PROCESS | 3752 | 1483615454984 Marionette TRACE conn4 <- [1,467,null,{"value":null}] 03:24:15 INFO - PROCESS | 3752 | 1483615455071 Marionette TRACE conn4 -> [0,468,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/interfaces.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/interfaces.html\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:15 INFO - PROCESS | 3752 | ++DOCSHELL 11E20800 == 46 [pid = 3752] [id = 126] 03:24:15 INFO - PROCESS | 3752 | ++DOMWINDOW == 71 (11E5E000) [pid = 3752] [serial = 378] [outer = 00000000] 03:24:15 INFO - PROCESS | 3752 | ++DOMWINDOW == 72 (140DF800) [pid = 3752] [serial = 379] [outer = 11E5E000] 03:24:15 INFO - PROCESS | 3752 | 1483615455142 Marionette DEBUG loaded listener.js 03:24:15 INFO - PROCESS | 3752 | ++DOMWINDOW == 73 (13D75800) [pid = 3752] [serial = 380] [outer = 11E5E000] 03:24:15 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_TRUE(ParseTypeAttribute(type, &version)) failed: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/base/nsScriptLoader.cpp, line 1455 03:24:15 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_TRUE(ParseTypeAttribute(type, &version)) failed: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/base/nsScriptLoader.cpp, line 1455 03:24:15 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_TRUE(ParseTypeAttribute(type, &version)) failed: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/base/nsScriptLoader.cpp, line 1455 03:24:16 INFO - PROCESS | 3752 | 1483615456312 Marionette TRACE conn4 <- [1,468,null,{"value":["/XMLHttpRequest/interfaces.html",0,null,null,[["XMLHttpRequestEventTarget interface: existence and properties of interface object",0,null,null],["XMLHttpRequestEventTarget interface object length",0,null,null],["XMLHttpRequestEventTarget interface object name",0,null,null],["XMLHttpRequestEventTarget interface: existence and properties of interface prototype object",0,null,null],["XMLHttpRequestEventTarget interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["XMLHttpRequestEventTarget interface: attribute onloadstart",0,null,null],["XMLHttpRequestEventTarget interface: attribute onprogress",0,null,null],["XMLHttpRequestEventTarget interface: attribute onabort",0,null,null],["XMLHttpRequestEventTarget interface: attribute onerror",0,null,null],["XMLHttpRequestEventTarget interface: attribute onload",0,null,null],["XMLHttpRequestEventTarget interface: attribute ontimeout",0,null,null],["XMLHttpRequestEventTarget interface: attribute onloadend",0,null,null],["XMLHttpRequestUpload interface: existence and properties of interface object",0,null,null],["XMLHttpRequestUpload interface object length",0,null,null],["XMLHttpRequestUpload interface object name",0,null,null],["XMLHttpRequestUpload interface: existence and properties of interface prototype object",0,null,null],["XMLHttpRequestUpload interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["XMLHttpRequestUpload must be primary interface of (new XMLHttpRequest()).upload",0,null,null],["Stringification of (new XMLHttpRequest()).upload",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onloadstart\" with the proper type (0)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onprogress\" with the proper type (1)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onabort\" with the proper type (2)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onerror\" with the proper type (3)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onload\" with the proper type (4)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"ontimeout\" with the proper type (5)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onloadend\" with the proper type (6)",0,null,null],["EventTarget interface: (new XMLHttpRequest()).upload must inherit property \"addEventListener\" with the proper type (0)",0,null,null],["EventTarget interface: calling addEventListener(DOMString,EventListener,boolean) on (new XMLHttpRequest()).upload with too few arguments must throw TypeError",0,null,null],["EventTarget interface: (new XMLHttpRequest()).upload must inherit property \"removeEventListener\" with the proper type (1)",0,null,null],["EventTarget interface: calling removeEventListener(DOMString,EventListener,boolean) on (new XMLHttpRequest()).upload with too few arguments must throw TypeError",0,null,null],["EventTarget interface: (new XMLHttpRequest()).upload must inherit property \"dispatchEvent\" with the proper type (2)",0,null,null],["EventTarget interface: calling dispatchEvent(Event) on (new XMLHttpRequest()).upload with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: existence and properties of interface object",0,null,null],["XMLHttpRequest interface object length",0,null,null],["XMLHttpRequest interface object name",0,null,null],["XMLHttpRequest interface: existence and properties of interface prototype object",0,null,null],["XMLHttpRequest interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["XMLHttpRequest interface: attribute onreadystatechange",0,null,null],["XMLHttpRequest interface: constant UNSENT on interface object",0,null,null],["XMLHttpRequest interface: constant UNSENT on interface prototype object",0,null,null],["XMLHttpRequest interface: constant OPENED on interface object",0,null,null],["XMLHttpRequest interface: constant OPENED on interface prototype object",0,null,null],["XMLHttpRequest interface: constant HEADERS_RECEIVED on interface object",0,null,null],["XMLHttpRequest interface: constant HEADERS_RECEIVED on interface prototype object",0,null,null],["XMLHttpRequest interface: constant LOADING on interface object",0,null,null],["XMLHttpRequest interface: constant LOADING on interface prototype object",0,null,null],["XMLHttpRequest interface: constant DONE on interface object",0,null,null],["XMLHttpRequest interface: constant DONE on interface prototype object",0,null,null],["XMLHttpRequest interface: attribute readyState",0,null,null],["XMLHttpRequest interface: operation open(ByteString,USVString)",0,null,null],["XMLHttpRequest interface: operation open(ByteString,USVString,boolean,USVString,USVString)",0,null,null],["XMLHttpRequest interface: operation setRequestHeader(ByteString,ByteString)",0,null,null],["XMLHttpRequest interface: attribute timeout",0,null,null],["XMLHttpRequest interface: attribute withCredentials",0,null,null],["XMLHttpRequest interface: attribute upload",0,null,null],["XMLHttpRequest interface: operation send([object Object],[object Object])",0,null,null],["XMLHttpRequest interface: operation abort()",0,null,null],["XMLHttpRequest interface: attribute responseURL",0,null,null],["XMLHttpRequest interface: attribute status",0,null,null],["XMLHttpRequest interface: attribute statusText",0,null,null],["XMLHttpRequest interface: operation getResponseHeader(ByteString)",0,null,null],["XMLHttpRequest interface: operation getAllResponseHeaders()",0,null,null],["XMLHttpRequest interface: operation overrideMimeType(DOMString)",0,null,null],["XMLHttpRequest interface: attribute responseType",0,null,null],["XMLHttpRequest interface: attribute response",0,null,null],["XMLHttpRequest interface: attribute responseText",0,null,null],["XMLHttpRequest interface: attribute responseXML",0,null,null],["XMLHttpRequest must be primary interface of new XMLHttpRequest()",0,null,null],["Stringification of new XMLHttpRequest()",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"onreadystatechange\" with the proper type (0)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"UNSENT\" with the proper type (1)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"OPENED\" with the proper type (2)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"HEADERS_RECEIVED\" with the proper type (3)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"LOADING\" with the proper type (4)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"DONE\" with the proper type (5)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"readyState\" with the proper type (6)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"open\" with the proper type (7)",0,null,null],["XMLHttpRequest interface: calling open(ByteString,USVString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"open\" with the proper type (8)",0,null,null],["XMLHttpRequest interface: calling open(ByteString,USVString,boolean,USVString,USVString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"setRequestHeader\" with the proper type (9)",0,null,null],["XMLHttpRequest interface: calling setRequestHeader(ByteString,ByteString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"timeout\" with the proper type (10)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"withCredentials\" with the proper type (11)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"upload\" with the proper type (12)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"send\" with the proper type (13)",0,null,null],["XMLHttpRequest interface: calling send([object Object],[object Object]) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"abort\" with the proper type (14)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseURL\" with the proper type (15)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"status\" with the proper type (16)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"statusText\" with the proper type (17)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"getResponseHeader\" with the proper type (18)",0,null,null],["XMLHttpRequest interface: calling getResponseHeader(ByteString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"getAllResponseHeaders\" with the proper type (19)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"overrideMimeType\" with the proper type (20)",0,null,null],["XMLHttpRequest interface: calling overrideMimeType(DOMString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseType\" with the proper type (21)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"response\" with the proper type (22)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseText\" with the proper type (23)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseXML\" with the proper type (24)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onloadstart\" with the proper type (0)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onprogress\" with the proper type (1)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onabort\" with the proper type (2)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onerror\" with the proper type (3)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onload\" with the proper type (4)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"ontimeout\" with the proper type (5)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onloadend\" with the proper type (6)",0,null,null],["EventTarget interface: new XMLHttpRequest() must inherit property \"addEventListener\" with the proper type (0)",0,null,null],["EventTarget interface: calling addEventListener(DOMString,EventListener,boolean) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["EventTarget interface: new XMLHttpRequest() must inherit property \"removeEventListener\" with the proper type (1)",0,null,null],["EventTarget interface: calling removeEventListener(DOMString,EventListener,boolean) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["EventTarget interface: new XMLHttpRequest() must inherit property \"dispatchEvent\" with the proper type (2)",0,null,null],["EventTarget interface: calling dispatchEvent(Event) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["FormData interface: existence and properties of interface object",0,null,null],["FormData interface object length",0,null,null],["FormData interface object name",0,null,null],["FormData interface: existence and properties of interface prototype object",0,null,null],["FormData interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["FormData interface: operation append(USVString,Blob,USVString)",0,null,null],["FormData interface: operation append(USVString,USVString)",0,null,null],["FormData interface: operation delete(USVString)",0,null,null],["FormData interface: operation get(USVString)",0,null,null],["FormData interface: operation getAll(USVString)",0,null,null],["FormData interface: operation has(USVString)",0,null,null],["FormData interface: operation set(USVString,Blob,USVString)",0,null,null],["FormData interface: operation set(USVString,USVString)",0,null,null],["FormData must be primary interface of new FormData()",0,null,null],["Stringification of new FormData()",0,null,null],["FormData interface: new FormData() must inherit property \"append\" with the proper type (0)",0,null,null],["FormData interface: calling append(USVString,Blob,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"append\" with the proper type (1)",0,null,null],["FormData interface: calling append(USVString,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"delete\" with the proper type (2)",0,null,null],["FormData interface: calling delete(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"get\" with the proper type (3)",0,null,null],["FormData interface: calling get(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"getAll\" with the proper type (4)",0,null,null],["FormData interface: calling getAll(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"has\" with the proper type (5)",0,null,null],["FormData interface: calling has(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"set\" with the proper type (6)",0,null,null],["FormData interface: calling set(USVString,Blob,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"set\" with the proper type (7)",0,null,null],["FormData interface: calling set(USVString,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData must be primary interface of new FormData(form)",0,null,null],["Stringification of new FormData(form)",0,null,null],["FormData interface: new FormData(form) must inherit property \"append\" with the proper type (0)",0,null,null],["FormData interface: calling append(USVString,Blob,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"append\" with the proper type (1)",0,null,null],["FormData interface: calling append(USVString,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"delete\" with the proper type (2)",0,null,null],["FormData interface: calling delete(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"get\" with the proper type (3)",0,null,null],["FormData interface: calling get(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"getAll\" with the proper type (4)",0,null,null],["FormData interface: calling getAll(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"has\" with the proper type (5)",0,null,null],["FormData interface: calling has(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"set\" with the proper type (6)",0,null,null],["FormData interface: calling set(USVString,Blob,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"set\" with the proper type (7)",0,null,null],["FormData interface: calling set(USVString,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["ProgressEvent interface: existence and properties of interface object",0,null,null],["ProgressEvent interface object length",0,null,null],["ProgressEvent interface object name",0,null,null],["ProgressEvent interface: existence and properties of interface prototype object",0,null,null],["ProgressEvent interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["ProgressEvent interface: attribute lengthComputable",0,null,null],["ProgressEvent interface: attribute loaded",0,null,null],["ProgressEvent interface: attribute total",0,null,null]]]}] 03:24:16 INFO - .......................................................................................................................................................................... 03:24:16 INFO - TEST-OK | /XMLHttpRequest/interfaces.html | took 1621ms 03:24:16 INFO - PROCESS | 3752 | 1483615456456 Marionette TRACE conn4 -> [0,469,"getWindowHandle",null] 03:24:16 INFO - PROCESS | 3752 | 1483615456462 Marionette TRACE conn4 <- [1,469,null,{"value":"12"}] 03:24:16 INFO - TEST-START | /XMLHttpRequest/open-after-abort.htm 03:24:16 INFO - PROCESS | 3752 | 1483615456470 Marionette TRACE conn4 -> [0,470,"timeouts",{"script":35000}] 03:24:16 INFO - PROCESS | 3752 | 1483615456475 Marionette TRACE conn4 <- [1,470,null,{}] 03:24:16 INFO - PROCESS | 3752 | 1483615456482 Marionette TRACE conn4 -> [0,471,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:16 INFO - PROCESS | 3752 | 1483615456605 Marionette TRACE conn4 <- [1,471,null,{"value":null}] 03:24:16 INFO - PROCESS | 3752 | 1483615456689 Marionette TRACE conn4 -> [0,472,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-after-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-after-abort.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:16 INFO - PROCESS | 3752 | ++DOCSHELL 18B76400 == 47 [pid = 3752] [id = 127] 03:24:16 INFO - PROCESS | 3752 | ++DOMWINDOW == 74 (194C2C00) [pid = 3752] [serial = 381] [outer = 00000000] 03:24:16 INFO - PROCESS | 3752 | ++DOMWINDOW == 75 (1A2EDC00) [pid = 3752] [serial = 382] [outer = 194C2C00] 03:24:16 INFO - PROCESS | 3752 | 1483615456755 Marionette DEBUG loaded listener.js 03:24:16 INFO - PROCESS | 3752 | ++DOMWINDOW == 76 (1A2EB800) [pid = 3752] [serial = 383] [outer = 194C2C00] 03:24:17 INFO - PROCESS | 3752 | 1483615457148 Marionette TRACE conn4 <- [1,472,null,{"value":["/XMLHttpRequest/open-after-abort.htm",0,null,null,[["XMLHttpRequest: open() after abort()",0,null,null]]]}] 03:24:17 INFO - . 03:24:17 INFO - TEST-OK | /XMLHttpRequest/open-after-abort.htm | took 702ms 03:24:17 INFO - PROCESS | 3752 | 1483615457170 Marionette TRACE conn4 -> [0,473,"getWindowHandle",null] 03:24:17 INFO - TEST-START | /XMLHttpRequest/open-after-setrequestheader.htm 03:24:17 INFO - PROCESS | 3752 | 1483615457173 Marionette TRACE conn4 <- [1,473,null,{"value":"12"}] 03:24:17 INFO - PROCESS | 3752 | 1483615457178 Marionette TRACE conn4 -> [0,474,"timeouts",{"script":35000}] 03:24:17 INFO - PROCESS | 3752 | 1483615457183 Marionette TRACE conn4 <- [1,474,null,{}] 03:24:17 INFO - PROCESS | 3752 | 1483615457196 Marionette TRACE conn4 -> [0,475,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:17 INFO - PROCESS | 3752 | 1483615457315 Marionette TRACE conn4 <- [1,475,null,{"value":null}] 03:24:17 INFO - PROCESS | 3752 | 1483615457388 Marionette TRACE conn4 -> [0,476,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-after-setrequestheader.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-after-setrequestheader.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:17 INFO - PROCESS | 3752 | ++DOCSHELL 1AD79C00 == 48 [pid = 3752] [id = 128] 03:24:17 INFO - PROCESS | 3752 | ++DOMWINDOW == 77 (1AD7B800) [pid = 3752] [serial = 384] [outer = 00000000] 03:24:17 INFO - PROCESS | 3752 | ++DOMWINDOW == 78 (1AD82800) [pid = 3752] [serial = 385] [outer = 1AD7B800] 03:24:17 INFO - PROCESS | 3752 | 1483615457455 Marionette DEBUG loaded listener.js 03:24:17 INFO - PROCESS | 3752 | ++DOMWINDOW == 79 (1AD81800) [pid = 3752] [serial = 386] [outer = 1AD7B800] 03:24:17 INFO - PROCESS | 3752 | 1483615457853 Marionette TRACE conn4 <- [1,476,null,{"value":["/XMLHttpRequest/open-after-setrequestheader.htm",0,null,null,[["XMLHttpRequest: open() after setRequestHeader()",0,null,null]]]}] 03:24:17 INFO - . 03:24:17 INFO - TEST-OK | /XMLHttpRequest/open-after-setrequestheader.htm | took 701ms 03:24:17 INFO - PROCESS | 3752 | 1483615457874 Marionette TRACE conn4 -> [0,477,"getWindowHandle",null] 03:24:17 INFO - PROCESS | 3752 | 1483615457878 Marionette TRACE conn4 <- [1,477,null,{"value":"12"}] 03:24:17 INFO - TEST-START | /XMLHttpRequest/open-during-abort.htm 03:24:17 INFO - PROCESS | 3752 | 1483615457882 Marionette TRACE conn4 -> [0,478,"timeouts",{"script":35000}] 03:24:17 INFO - PROCESS | 3752 | 1483615457885 Marionette TRACE conn4 <- [1,478,null,{}] 03:24:17 INFO - PROCESS | 3752 | 1483615457890 Marionette TRACE conn4 -> [0,479,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:18 INFO - PROCESS | 3752 | 1483615458013 Marionette TRACE conn4 <- [1,479,null,{"value":null}] 03:24:18 INFO - PROCESS | 3752 | 1483615458084 Marionette TRACE conn4 -> [0,480,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-during-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-during-abort.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:18 INFO - PROCESS | 3752 | ++DOCSHELL 1BD28C00 == 49 [pid = 3752] [id = 129] 03:24:18 INFO - PROCESS | 3752 | ++DOMWINDOW == 80 (1BD2D400) [pid = 3752] [serial = 387] [outer = 00000000] 03:24:18 INFO - PROCESS | 3752 | ++DOMWINDOW == 81 (1BD35000) [pid = 3752] [serial = 388] [outer = 1BD2D400] 03:24:18 INFO - PROCESS | 3752 | 1483615458149 Marionette DEBUG loaded listener.js 03:24:18 INFO - PROCESS | 3752 | ++DOMWINDOW == 82 (112E1400) [pid = 3752] [serial = 389] [outer = 1BD2D400] 03:24:18 INFO - PROCESS | 3752 | 1483615458752 Marionette TRACE conn4 <- [1,480,null,{"value":["/XMLHttpRequest/open-during-abort.htm",0,null,null,[["XMLHttpRequest: open() during abort()",0,null,null]]]}] 03:24:18 INFO - . 03:24:18 INFO - TEST-OK | /XMLHttpRequest/open-during-abort.htm | took 904ms 03:24:18 INFO - PROCESS | 3752 | 1483615458785 Marionette TRACE conn4 -> [0,481,"getWindowHandle",null] 03:24:18 INFO - PROCESS | 3752 | 1483615458790 Marionette TRACE conn4 <- [1,481,null,{"value":"12"}] 03:24:18 INFO - TEST-START | /XMLHttpRequest/open-method-bogus.htm 03:24:18 INFO - PROCESS | 3752 | 1483615458796 Marionette TRACE conn4 -> [0,482,"timeouts",{"script":35000}] 03:24:18 INFO - PROCESS | 3752 | 1483615458800 Marionette TRACE conn4 <- [1,482,null,{}] 03:24:18 INFO - PROCESS | 3752 | 1483615458807 Marionette TRACE conn4 -> [0,483,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:18 INFO - PROCESS | 3752 | 1483615458965 Marionette TRACE conn4 <- [1,483,null,{"value":null}] 03:24:19 INFO - PROCESS | 3752 | 1483615459035 Marionette TRACE conn4 -> [0,484,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-bogus.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-bogus.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:19 INFO - PROCESS | 3752 | ++DOCSHELL 112E4800 == 50 [pid = 3752] [id = 130] 03:24:19 INFO - PROCESS | 3752 | ++DOMWINDOW == 83 (112E6000) [pid = 3752] [serial = 390] [outer = 00000000] 03:24:19 INFO - PROCESS | 3752 | ++DOMWINDOW == 84 (12151400) [pid = 3752] [serial = 391] [outer = 112E6000] 03:24:19 INFO - PROCESS | 3752 | 1483615459095 Marionette DEBUG loaded listener.js 03:24:19 INFO - PROCESS | 3752 | ++DOMWINDOW == 85 (112E8000) [pid = 3752] [serial = 392] [outer = 112E6000] 03:24:19 INFO - PROCESS | 3752 | [3752] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1453 03:24:19 INFO - PROCESS | 3752 | [3752] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1453 03:24:19 INFO - PROCESS | 3752 | [3752] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1453 03:24:19 INFO - PROCESS | 3752 | [3752] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1453 03:24:19 INFO - PROCESS | 3752 | [3752] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1453 03:24:19 INFO - PROCESS | 3752 | [3752] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1453 03:24:19 INFO - PROCESS | 3752 | [3752] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1453 03:24:19 INFO - PROCESS | 3752 | [3752] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1453 03:24:19 INFO - PROCESS | 3752 | 1483615459533 Marionette TRACE conn4 <- [1,484,null,{"value":["/XMLHttpRequest/open-method-bogus.htm",0,null,null,[["XMLHttpRequest: open() - bogus methods ()",0,null,null],["XMLHttpRequest: open() - bogus methods (>)",0,null,null],["XMLHttpRequest: open() - bogus methods ( GET)",0,null,null],["XMLHttpRequest: open() - bogus methods (G T)",0,null,null],["XMLHttpRequest: open() - bogus methods (@GET)",0,null,null],["XMLHttpRequest: open() - bogus methods (G:ET)",0,null,null],["XMLHttpRequest: open() - bogus methods (GET?)",0,null,null],["XMLHttpRequest: open() - bogus methods (GET\n)",0,null,null]]]}] 03:24:19 INFO - ........ 03:24:19 INFO - TEST-OK | /XMLHttpRequest/open-method-bogus.htm | took 795ms 03:24:19 INFO - PROCESS | 3752 | 1483615459599 Marionette TRACE conn4 -> [0,485,"getWindowHandle",null] 03:24:19 INFO - PROCESS | 3752 | 1483615459605 Marionette TRACE conn4 <- [1,485,null,{"value":"12"}] 03:24:19 INFO - PROCESS | 3752 | 1483615459656 Marionette TRACE conn4 -> [0,486,"timeouts",{"script":35000}] 03:24:19 INFO - TEST-START | /XMLHttpRequest/open-method-case-insensitive.htm 03:24:19 INFO - PROCESS | 3752 | 1483615459660 Marionette TRACE conn4 <- [1,486,null,{}] 03:24:19 INFO - PROCESS | 3752 | 1483615459669 Marionette TRACE conn4 -> [0,487,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:19 INFO - PROCESS | 3752 | 1483615459789 Marionette TRACE conn4 <- [1,487,null,{"value":null}] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 14B61400 == 49 [pid = 3752] [id = 102] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 16F05C00 == 48 [pid = 3752] [id = 103] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 17C9B000 == 47 [pid = 3752] [id = 104] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 1289AC00 == 46 [pid = 3752] [id = 101] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 16320800 == 45 [pid = 3752] [id = 124] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 168B5000 == 44 [pid = 3752] [id = 122] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 14498400 == 43 [pid = 3752] [id = 123] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 12DE3400 == 42 [pid = 3752] [id = 120] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 18699000 == 41 [pid = 3752] [id = 121] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 1735A000 == 40 [pid = 3752] [id = 118] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 15F60000 == 39 [pid = 3752] [id = 119] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 0FED7800 == 38 [pid = 3752] [id = 116] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 17A6D000 == 37 [pid = 3752] [id = 105] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 160D4400 == 36 [pid = 3752] [id = 117] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 0F355400 == 35 [pid = 3752] [id = 115] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 15F62400 == 34 [pid = 3752] [id = 109] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 15E71C00 == 33 [pid = 3752] [id = 111] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 11E2B000 == 32 [pid = 3752] [id = 110] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 1698F400 == 31 [pid = 3752] [id = 112] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 184B5000 == 30 [pid = 3752] [id = 114] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 17ADEC00 == 29 [pid = 3752] [id = 113] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 112E4800 == 28 [pid = 3752] [id = 130] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 160D4800 == 27 [pid = 3752] [id = 125] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 11E20800 == 26 [pid = 3752] [id = 126] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 18B76400 == 25 [pid = 3752] [id = 127] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 1AD79C00 == 24 [pid = 3752] [id = 128] 03:24:20 INFO - PROCESS | 3752 | --DOCSHELL 1BD28C00 == 23 [pid = 3752] [id = 129] 03:24:20 INFO - PROCESS | 3752 | --DOMWINDOW == 84 (12BF8C00) [pid = 3752] [serial = 323] [outer = 00000000] [url = about:blank] 03:24:20 INFO - PROCESS | 3752 | --DOMWINDOW == 83 (11CA8C00) [pid = 3752] [serial = 319] [outer = 00000000] [url = about:blank] 03:24:20 INFO - PROCESS | 3752 | --DOMWINDOW == 82 (11CB7400) [pid = 3752] [serial = 320] [outer = 00000000] [url = about:blank] 03:24:20 INFO - PROCESS | 3752 | --DOMWINDOW == 81 (12BFCC00) [pid = 3752] [serial = 322] [outer = 00000000] [url = about:blank] 03:24:20 INFO - PROCESS | 3752 | --DOMWINDOW == 80 (1477B400) [pid = 3752] [serial = 325] [outer = 00000000] [url = about:blank] 03:24:20 INFO - PROCESS | 3752 | --DOMWINDOW == 79 (13FEB400) [pid = 3752] [serial = 326] [outer = 00000000] [url = about:blank] 03:24:20 INFO - PROCESS | 3752 | 1483615460511 Marionette TRACE conn4 -> [0,488,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-case-insensitive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-case-insensitive.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:20 INFO - PROCESS | 3752 | ++DOCSHELL 0F697000 == 24 [pid = 3752] [id = 131] 03:24:20 INFO - PROCESS | 3752 | ++DOMWINDOW == 80 (0F9C9C00) [pid = 3752] [serial = 393] [outer = 00000000] 03:24:20 INFO - PROCESS | 3752 | ++DOMWINDOW == 81 (0FEDAC00) [pid = 3752] [serial = 394] [outer = 0F9C9C00] 03:24:20 INFO - PROCESS | 3752 | 1483615460581 Marionette DEBUG loaded listener.js 03:24:20 INFO - PROCESS | 3752 | ++DOMWINDOW == 82 (0FE39000) [pid = 3752] [serial = 395] [outer = 0F9C9C00] 03:24:20 INFO - PROCESS | 3752 | 1483615460939 Marionette TRACE conn4 <- [1,488,null,{"value":["/XMLHttpRequest/open-method-case-insensitive.htm",0,null,null,[["XMLHttpRequest: open() - case-insensitive methods test (DELETE)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (GET)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (HEAD)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (OPTIONS)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (POST)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (PUT)",0,null,null]]]}] 03:24:20 INFO - ...... 03:24:20 INFO - TEST-OK | /XMLHttpRequest/open-method-case-insensitive.htm | took 1294ms 03:24:20 INFO - PROCESS | 3752 | 1483615460956 Marionette TRACE conn4 -> [0,489,"getWindowHandle",null] 03:24:20 INFO - PROCESS | 3752 | 1483615460961 Marionette TRACE conn4 <- [1,489,null,{"value":"12"}] 03:24:20 INFO - PROCESS | 3752 | 1483615460970 Marionette TRACE conn4 -> [0,490,"timeouts",{"script":35000}] 03:24:20 INFO - TEST-START | /XMLHttpRequest/open-method-case-sensitive.htm 03:24:20 INFO - PROCESS | 3752 | 1483615460975 Marionette TRACE conn4 <- [1,490,null,{}] 03:24:20 INFO - PROCESS | 3752 | 1483615460980 Marionette TRACE conn4 -> [0,491,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:21 INFO - PROCESS | 3752 | 1483615461089 Marionette TRACE conn4 <- [1,491,null,{"value":null}] 03:24:21 INFO - PROCESS | 3752 | 1483615461161 Marionette TRACE conn4 -> [0,492,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-case-sensitive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-case-sensitive.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:21 INFO - PROCESS | 3752 | ++DOCSHELL 11E61C00 == 25 [pid = 3752] [id = 132] 03:24:21 INFO - PROCESS | 3752 | ++DOMWINDOW == 83 (122DA800) [pid = 3752] [serial = 396] [outer = 00000000] 03:24:21 INFO - PROCESS | 3752 | ++DOMWINDOW == 84 (12DEA400) [pid = 3752] [serial = 397] [outer = 122DA800] 03:24:21 INFO - PROCESS | 3752 | 1483615461216 Marionette DEBUG loaded listener.js 03:24:21 INFO - PROCESS | 3752 | ++DOMWINDOW == 85 (12B24C00) [pid = 3752] [serial = 398] [outer = 122DA800] 03:24:21 INFO - PROCESS | 3752 | 1483615461577 Marionette TRACE conn4 <- [1,492,null,{"value":["/XMLHttpRequest/open-method-case-sensitive.htm",0,null,null,[["XMLHttpRequest: open() - case-sensitive methods test (XUNICORN)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (xUNIcorn)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (chiCKEN)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (PATCH)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (patCH)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (copy)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (COpy)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (inDEX)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (movE)",0,null,null]]]}] 03:24:21 INFO - ......... 03:24:21 INFO - TEST-OK | /XMLHttpRequest/open-method-case-sensitive.htm | took 639ms 03:24:21 INFO - PROCESS | 3752 | 1483615461597 Marionette TRACE conn4 -> [0,493,"getWindowHandle",null] 03:24:21 INFO - PROCESS | 3752 | 1483615461601 Marionette TRACE conn4 <- [1,493,null,{"value":"12"}] 03:24:21 INFO - TEST-START | /XMLHttpRequest/open-method-insecure.htm 03:24:21 INFO - PROCESS | 3752 | 1483615461606 Marionette TRACE conn4 -> [0,494,"timeouts",{"script":35000}] 03:24:21 INFO - PROCESS | 3752 | 1483615461609 Marionette TRACE conn4 <- [1,494,null,{}] 03:24:21 INFO - PROCESS | 3752 | 1483615461618 Marionette TRACE conn4 -> [0,495,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:21 INFO - PROCESS | 3752 | 1483615461760 Marionette TRACE conn4 <- [1,495,null,{"value":null}] 03:24:21 INFO - PROCESS | 3752 | 1483615461768 Marionette TRACE conn4 -> [0,496,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-insecure.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-insecure.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:21 INFO - PROCESS | 3752 | ++DOCSHELL 1441FC00 == 26 [pid = 3752] [id = 133] 03:24:21 INFO - PROCESS | 3752 | ++DOMWINDOW == 86 (14425C00) [pid = 3752] [serial = 399] [outer = 00000000] 03:24:21 INFO - PROCESS | 3752 | ++DOMWINDOW == 87 (15F60000) [pid = 3752] [serial = 400] [outer = 14425C00] 03:24:21 INFO - PROCESS | 3752 | 1483615461823 Marionette DEBUG loaded listener.js 03:24:21 INFO - PROCESS | 3752 | ++DOMWINDOW == 88 (15F6B400) [pid = 3752] [serial = 401] [outer = 14425C00] 03:24:22 INFO - PROCESS | 3752 | [3752] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1453 03:24:22 INFO - PROCESS | 3752 | [3752] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1453 03:24:22 INFO - PROCESS | 3752 | [3752] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1453 03:24:22 INFO - PROCESS | 3752 | [3752] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1453 03:24:22 INFO - PROCESS | 3752 | [3752] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1453 03:24:22 INFO - PROCESS | 3752 | [3752] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1453 03:24:22 INFO - PROCESS | 3752 | [3752] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1453 03:24:22 INFO - PROCESS | 3752 | [3752] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1453 03:24:22 INFO - PROCESS | 3752 | [3752] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1453 03:24:22 INFO - PROCESS | 3752 | 1483615462204 Marionette TRACE conn4 <- [1,496,null,{"value":["/XMLHttpRequest/open-method-insecure.htm",0,null,null,[["XMLHttpRequest: open() - \"insecure\" methods (track)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (TRACK)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (trAck)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (TRACE)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (trace)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (traCE)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (connect)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (CONNECT)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (connECT)",0,null,null]]]}] 03:24:22 INFO - ......... 03:24:22 INFO - TEST-OK | /XMLHttpRequest/open-method-insecure.htm | took 623ms 03:24:22 INFO - PROCESS | 3752 | 1483615462244 Marionette TRACE conn4 -> [0,497,"getWindowHandle",null] 03:24:22 INFO - PROCESS | 3752 | 1483615462246 Marionette TRACE conn4 <- [1,497,null,{"value":"12"}] 03:24:22 INFO - TEST-START | /XMLHttpRequest/open-method-responsetype-set-sync.htm 03:24:22 INFO - PROCESS | 3752 | 1483615462257 Marionette TRACE conn4 -> [0,498,"timeouts",{"script":35000}] 03:24:22 INFO - PROCESS | 3752 | 1483615462264 Marionette TRACE conn4 <- [1,498,null,{}] 03:24:22 INFO - PROCESS | 3752 | 1483615462270 Marionette TRACE conn4 -> [0,499,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:22 INFO - PROCESS | 3752 | 1483615462368 Marionette TRACE conn4 <- [1,499,null,{"value":null}] 03:24:22 INFO - PROCESS | 3752 | 1483615462376 Marionette TRACE conn4 -> [0,500,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-responsetype-set-sync.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-responsetype-set-sync.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:22 INFO - PROCESS | 3752 | ++DOCSHELL 16321800 == 27 [pid = 3752] [id = 134] 03:24:22 INFO - PROCESS | 3752 | ++DOMWINDOW == 89 (1665C400) [pid = 3752] [serial = 402] [outer = 00000000] 03:24:22 INFO - PROCESS | 3752 | ++DOMWINDOW == 90 (16F98000) [pid = 3752] [serial = 403] [outer = 1665C400] 03:24:22 INFO - PROCESS | 3752 | 1483615462429 Marionette DEBUG loaded listener.js 03:24:22 INFO - PROCESS | 3752 | ++DOMWINDOW == 91 (1698B800) [pid = 3752] [serial = 404] [outer = 1665C400] 03:24:22 INFO - PROCESS | 3752 | 1483615462851 Marionette TRACE conn4 <- [1,500,null,{"value":["/XMLHttpRequest/open-method-responsetype-set-sync.htm",0,null,null,[["XMLHttpRequest: open() sync request not allowed if responseType is set (arraybuffer)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (blob)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (json)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (text)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (document)",0,null,null]]]}] 03:24:22 INFO - ..... 03:24:22 INFO - TEST-OK | /XMLHttpRequest/open-method-responsetype-set-sync.htm | took 654ms 03:24:22 INFO - PROCESS | 3752 | 1483615462909 Marionette TRACE conn4 -> [0,501,"getWindowHandle",null] 03:24:22 INFO - PROCESS | 3752 | 1483615462912 Marionette TRACE conn4 <- [1,501,null,{"value":"12"}] 03:24:22 INFO - TEST-START | /XMLHttpRequest/open-open-send.htm 03:24:22 INFO - PROCESS | 3752 | 1483615462917 Marionette TRACE conn4 -> [0,502,"timeouts",{"script":35000}] 03:24:22 INFO - PROCESS | 3752 | 1483615462920 Marionette TRACE conn4 <- [1,502,null,{}] 03:24:22 INFO - PROCESS | 3752 | 1483615462930 Marionette TRACE conn4 -> [0,503,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:23 INFO - PROCESS | 3752 | 1483615463050 Marionette TRACE conn4 <- [1,503,null,{"value":null}] 03:24:23 INFO - PROCESS | 3752 | 1483615463055 Marionette TRACE conn4 -> [0,504,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-open-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-open-send.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:23 INFO - PROCESS | 3752 | ++DOCSHELL 17C9BC00 == 28 [pid = 3752] [id = 135] 03:24:23 INFO - PROCESS | 3752 | ++DOMWINDOW == 92 (17C9C000) [pid = 3752] [serial = 405] [outer = 00000000] 03:24:23 INFO - PROCESS | 3752 | ++DOMWINDOW == 93 (188F5800) [pid = 3752] [serial = 406] [outer = 17C9C000] 03:24:23 INFO - PROCESS | 3752 | 1483615463112 Marionette DEBUG loaded listener.js 03:24:23 INFO - PROCESS | 3752 | ++DOMWINDOW == 94 (184C1C00) [pid = 3752] [serial = 407] [outer = 17C9C000] 03:24:23 INFO - PROCESS | 3752 | 1483615463466 Marionette TRACE conn4 <- [1,504,null,{"value":["/XMLHttpRequest/open-open-send.htm",0,null,null,[["XMLHttpRequest: open() - open() - send()",0,null,null]]]}] 03:24:23 INFO - . 03:24:23 INFO - TEST-OK | /XMLHttpRequest/open-open-send.htm | took 593ms 03:24:23 INFO - PROCESS | 3752 | 1483615463511 Marionette TRACE conn4 -> [0,505,"getWindowHandle",null] 03:24:23 INFO - PROCESS | 3752 | 1483615463513 Marionette TRACE conn4 <- [1,505,null,{"value":"12"}] 03:24:23 INFO - TEST-START | /XMLHttpRequest/open-open-sync-send.htm 03:24:23 INFO - PROCESS | 3752 | 1483615463517 Marionette TRACE conn4 -> [0,506,"timeouts",{"script":35000}] 03:24:23 INFO - PROCESS | 3752 | 1483615463519 Marionette TRACE conn4 <- [1,506,null,{}] 03:24:23 INFO - PROCESS | 3752 | 1483615463523 Marionette TRACE conn4 -> [0,507,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:23 INFO - PROCESS | 3752 | 1483615463644 Marionette TRACE conn4 <- [1,507,null,{"value":null}] 03:24:23 INFO - PROCESS | 3752 | 1483615463651 Marionette TRACE conn4 -> [0,508,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-open-sync-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-open-sync-send.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:23 INFO - PROCESS | 3752 | ++DOCSHELL 194C5000 == 29 [pid = 3752] [id = 136] 03:24:23 INFO - PROCESS | 3752 | ++DOMWINDOW == 95 (194C5400) [pid = 3752] [serial = 408] [outer = 00000000] 03:24:23 INFO - PROCESS | 3752 | ++DOMWINDOW == 96 (19ABF000) [pid = 3752] [serial = 409] [outer = 194C5400] 03:24:23 INFO - PROCESS | 3752 | 1483615463723 Marionette DEBUG loaded listener.js 03:24:23 INFO - PROCESS | 3752 | ++DOMWINDOW == 97 (19AC7000) [pid = 3752] [serial = 410] [outer = 194C5400] 03:24:24 INFO - PROCESS | 3752 | 1483615464127 Marionette TRACE conn4 <- [1,508,null,{"value":["/XMLHttpRequest/open-open-sync-send.htm",0,null,null,[["XMLHttpRequest: open() - open() (sync) - send()",0,null,null]]]}] 03:24:24 INFO - . 03:24:24 INFO - TEST-OK | /XMLHttpRequest/open-open-sync-send.htm | took 639ms 03:24:24 INFO - PROCESS | 3752 | 1483615464154 Marionette TRACE conn4 -> [0,509,"getWindowHandle",null] 03:24:24 INFO - PROCESS | 3752 | 1483615464156 Marionette TRACE conn4 <- [1,509,null,{"value":"12"}] 03:24:24 INFO - TEST-START | /XMLHttpRequest/open-referer.htm 03:24:24 INFO - PROCESS | 3752 | 1483615464160 Marionette TRACE conn4 -> [0,510,"timeouts",{"script":35000}] 03:24:24 INFO - PROCESS | 3752 | 1483615464162 Marionette TRACE conn4 <- [1,510,null,{}] 03:24:24 INFO - PROCESS | 3752 | 1483615464166 Marionette TRACE conn4 -> [0,511,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:24 INFO - PROCESS | 3752 | 1483615464284 Marionette TRACE conn4 <- [1,511,null,{"value":null}] 03:24:24 INFO - PROCESS | 3752 | 1483615464289 Marionette TRACE conn4 -> [0,512,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-referer.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-referer.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:24 INFO - PROCESS | 3752 | ++DOCSHELL 186E9400 == 30 [pid = 3752] [id = 137] 03:24:24 INFO - PROCESS | 3752 | ++DOMWINDOW == 98 (194C4000) [pid = 3752] [serial = 411] [outer = 00000000] 03:24:24 INFO - PROCESS | 3752 | ++DOMWINDOW == 99 (1AD7AC00) [pid = 3752] [serial = 412] [outer = 194C4000] 03:24:24 INFO - PROCESS | 3752 | 1483615464382 Marionette DEBUG loaded listener.js 03:24:24 INFO - PROCESS | 3752 | ++DOMWINDOW == 100 (1A6A3C00) [pid = 3752] [serial = 413] [outer = 194C4000] 03:24:24 INFO - PROCESS | 3752 | --DOMWINDOW == 99 (18B72800) [pid = 3752] [serial = 366] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-server-date.htm] 03:24:24 INFO - PROCESS | 3752 | --DOMWINDOW == 98 (17CA5C00) [pid = 3752] [serial = 357] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-chunked-trailer.htm] 03:24:24 INFO - PROCESS | 3752 | --DOMWINDOW == 97 (1124E800) [pid = 3752] [serial = 348] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-cookies.htm] 03:24:24 INFO - PROCESS | 3752 | --DOMWINDOW == 96 (184B7400) [pid = 3752] [serial = 342] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-set.htm] 03:24:24 INFO - PROCESS | 3752 | --DOMWINDOW == 95 (19ABA000) [pid = 3752] [serial = 372] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-unsent-opened-state.htm] 03:24:24 INFO - PROCESS | 3752 | --DOMWINDOW == 94 (1A2EB000) [pid = 3752] [serial = 375] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/headers-normalize-response.htm] 03:24:24 INFO - PROCESS | 3752 | --DOMWINDOW == 93 (16D03400) [pid = 3752] [serial = 336] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-get.htm] 03:24:24 INFO - PROCESS | 3752 | --DOMWINDOW == 92 (189DE800) [pid = 3752] [serial = 363] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-error-state.htm] 03:24:24 INFO - PROCESS | 3752 | --DOMWINDOW == 91 (17AE0800) [pid = 3752] [serial = 339] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-has.htm] 03:24:24 INFO - PROCESS | 3752 | --DOMWINDOW == 90 (0F35BC00) [pid = 3752] [serial = 345] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata.htm] 03:24:24 INFO - PROCESS | 3752 | --DOMWINDOW == 89 (160D8800) [pid = 3752] [serial = 351] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-status.htm] 03:24:24 INFO - PROCESS | 3752 | --DOMWINDOW == 88 (15E78400) [pid = 3752] [serial = 333] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-delete.htm] 03:24:24 INFO - PROCESS | 3752 | --DOMWINDOW == 87 (160D8400) [pid = 3752] [serial = 369] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-special-characters.htm] 03:24:24 INFO - PROCESS | 3752 | --DOMWINDOW == 86 (15F6A400) [pid = 3752] [serial = 327] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-upload-progress.htm] 03:24:24 INFO - PROCESS | 3752 | --DOMWINDOW == 85 (11E2B800) [pid = 3752] [serial = 330] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-blob.htm] 03:24:24 INFO - PROCESS | 3752 | --DOMWINDOW == 84 (17A64800) [pid = 3752] [serial = 354] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-case-insensitive.htm] 03:24:24 INFO - PROCESS | 3752 | --DOMWINDOW == 83 (13FE7000) [pid = 3752] [serial = 360] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-cookies-and-more.htm] 03:24:24 INFO - PROCESS | 3752 | --DOMWINDOW == 82 (17C9A400) [pid = 3752] [serial = 315] [outer = 00000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm] 03:24:25 INFO - PROCESS | 3752 | 1483615465032 Marionette TRACE conn4 <- [1,512,null,{"value":["/XMLHttpRequest/open-referer.htm",0,null,null,[["XMLHttpRequest: open() - value of Referer header",0,null,null]]]}] 03:24:25 INFO - . 03:24:25 INFO - TEST-OK | /XMLHttpRequest/open-referer.htm | took 904ms 03:24:25 INFO - PROCESS | 3752 | 1483615465064 Marionette TRACE conn4 -> [0,513,"getWindowHandle",null] 03:24:25 INFO - PROCESS | 3752 | 1483615465066 Marionette TRACE conn4 <- [1,513,null,{"value":"12"}] 03:24:25 INFO - TEST-START | /XMLHttpRequest/open-send-open.htm 03:24:25 INFO - PROCESS | 3752 | 1483615465071 Marionette TRACE conn4 -> [0,514,"timeouts",{"script":35000}] 03:24:25 INFO - PROCESS | 3752 | 1483615465073 Marionette TRACE conn4 <- [1,514,null,{}] 03:24:25 INFO - PROCESS | 3752 | 1483615465077 Marionette TRACE conn4 -> [0,515,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:25 INFO - PROCESS | 3752 | 1483615465162 Marionette TRACE conn4 <- [1,515,null,{"value":null}] 03:24:25 INFO - PROCESS | 3752 | 1483615465236 Marionette TRACE conn4 -> [0,516,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-send-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-send-open.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:25 INFO - PROCESS | 3752 | ++DOCSHELL 16986000 == 31 [pid = 3752] [id = 138] 03:24:25 INFO - PROCESS | 3752 | ++DOMWINDOW == 83 (17ADEC00) [pid = 3752] [serial = 414] [outer = 00000000] 03:24:25 INFO - PROCESS | 3752 | ++DOMWINDOW == 84 (1A6A0400) [pid = 3752] [serial = 415] [outer = 17ADEC00] 03:24:25 INFO - PROCESS | 3752 | 1483615465289 Marionette DEBUG loaded listener.js 03:24:25 INFO - PROCESS | 3752 | ++DOMWINDOW == 85 (19ABA000) [pid = 3752] [serial = 416] [outer = 17ADEC00] 03:24:25 INFO - PROCESS | 3752 | 1483615465557 Marionette TRACE conn4 <- [1,516,null,{"value":["/XMLHttpRequest/open-send-open.htm",0,null,null,[["XMLHttpRequest: open() - send() - open()",0,null,null]]]}] 03:24:25 INFO - . 03:24:25 INFO - TEST-OK | /XMLHttpRequest/open-send-open.htm | took 545ms 03:24:25 INFO - PROCESS | 3752 | 1483615465605 Marionette TRACE conn4 -> [0,517,"getWindowHandle",null] 03:24:25 INFO - PROCESS | 3752 | 1483615465608 Marionette TRACE conn4 <- [1,517,null,{"value":"12"}] 03:24:25 INFO - TEST-START | /XMLHttpRequest/open-sync-open-send.htm 03:24:25 INFO - PROCESS | 3752 | 1483615465612 Marionette TRACE conn4 -> [0,518,"timeouts",{"script":35000}] 03:24:25 INFO - PROCESS | 3752 | 1483615465613 Marionette TRACE conn4 <- [1,518,null,{}] 03:24:25 INFO - PROCESS | 3752 | 1483615465617 Marionette TRACE conn4 -> [0,519,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:25 INFO - PROCESS | 3752 | 1483615465700 Marionette TRACE conn4 <- [1,519,null,{"value":null}] 03:24:25 INFO - PROCESS | 3752 | 1483615465706 Marionette TRACE conn4 -> [0,520,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-sync-open-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-sync-open-send.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:25 INFO - PROCESS | 3752 | ++DOCSHELL 1A698800 == 32 [pid = 3752] [id = 139] 03:24:25 INFO - PROCESS | 3752 | ++DOMWINDOW == 86 (1AD7CC00) [pid = 3752] [serial = 417] [outer = 00000000] 03:24:25 INFO - PROCESS | 3752 | ++DOMWINDOW == 87 (1BD33800) [pid = 3752] [serial = 418] [outer = 1AD7CC00] 03:24:25 INFO - PROCESS | 3752 | 1483615465758 Marionette DEBUG loaded listener.js 03:24:25 INFO - PROCESS | 3752 | ++DOMWINDOW == 88 (1BD32400) [pid = 3752] [serial = 419] [outer = 1AD7CC00] 03:24:26 INFO - PROCESS | 3752 | 1483615466112 Marionette TRACE conn4 <- [1,520,null,{"value":["/XMLHttpRequest/open-sync-open-send.htm",0,null,null,[["XMLHttpRequest: open() (sync) - send() - open()",0,null,null]]]}] 03:24:26 INFO - . 03:24:26 INFO - TEST-OK | /XMLHttpRequest/open-sync-open-send.htm | took 530ms 03:24:26 INFO - PROCESS | 3752 | 1483615466146 Marionette TRACE conn4 -> [0,521,"getWindowHandle",null] 03:24:26 INFO - PROCESS | 3752 | 1483615466149 Marionette TRACE conn4 <- [1,521,null,{"value":"12"}] 03:24:26 INFO - TEST-START | /XMLHttpRequest/open-url-about-blank-window.htm 03:24:26 INFO - PROCESS | 3752 | 1483615466153 Marionette TRACE conn4 -> [0,522,"timeouts",{"script":35000}] 03:24:26 INFO - PROCESS | 3752 | 1483615466155 Marionette TRACE conn4 <- [1,522,null,{}] 03:24:26 INFO - PROCESS | 3752 | 1483615466159 Marionette TRACE conn4 -> [0,523,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:26 INFO - PROCESS | 3752 | 1483615466279 Marionette TRACE conn4 <- [1,523,null,{"value":null}] 03:24:26 INFO - PROCESS | 3752 | 1483615466289 Marionette TRACE conn4 -> [0,524,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-about-blank-window.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-about-blank-window.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:26 INFO - PROCESS | 3752 | ++DOCSHELL 12160800 == 33 [pid = 3752] [id = 140] 03:24:26 INFO - PROCESS | 3752 | ++DOMWINDOW == 89 (12163800) [pid = 3752] [serial = 420] [outer = 00000000] 03:24:26 INFO - PROCESS | 3752 | ++DOMWINDOW == 90 (1AD88000) [pid = 3752] [serial = 421] [outer = 12163800] 03:24:26 INFO - PROCESS | 3752 | 1483615466343 Marionette DEBUG loaded listener.js 03:24:26 INFO - PROCESS | 3752 | ++DOMWINDOW == 91 (1A2EF000) [pid = 3752] [serial = 422] [outer = 12163800] 03:24:26 INFO - PROCESS | 3752 | ++DOCSHELL 153DA800 == 34 [pid = 3752] [id = 141] 03:24:26 INFO - PROCESS | 3752 | ++DOMWINDOW == 92 (153DAC00) [pid = 3752] [serial = 423] [outer = 00000000] 03:24:26 INFO - PROCESS | 3752 | ++DOMWINDOW == 93 (12169C00) [pid = 3752] [serial = 424] [outer = 153DAC00] 03:24:26 INFO - PROCESS | 3752 | 1483615466716 Marionette TRACE conn4 <- [1,524,null,{"value":["/XMLHttpRequest/open-url-about-blank-window.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs (about:blank iframe)",0,null,null]]]}] 03:24:26 INFO - . 03:24:26 INFO - TEST-OK | /XMLHttpRequest/open-url-about-blank-window.htm | took 592ms 03:24:26 INFO - PROCESS | 3752 | 1483615466749 Marionette TRACE conn4 -> [0,525,"getWindowHandle",null] 03:24:26 INFO - PROCESS | 3752 | 1483615466751 Marionette TRACE conn4 <- [1,525,null,{"value":"12"}] 03:24:26 INFO - TEST-START | /XMLHttpRequest/open-url-base-inserted-after-open.htm 03:24:26 INFO - PROCESS | 3752 | 1483615466754 Marionette TRACE conn4 -> [0,526,"timeouts",{"script":35000}] 03:24:26 INFO - PROCESS | 3752 | 1483615466756 Marionette TRACE conn4 <- [1,526,null,{}] 03:24:26 INFO - PROCESS | 3752 | 1483615466760 Marionette TRACE conn4 -> [0,527,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:26 INFO - PROCESS | 3752 | 1483615466900 Marionette TRACE conn4 <- [1,527,null,{"value":null}] 03:24:27 INFO - PROCESS | 3752 | 1483615467108 Marionette TRACE conn4 -> [0,528,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-base-inserted-after-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-base-inserted-after-open.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:27 INFO - PROCESS | 3752 | ++DOCSHELL 0F9C4800 == 35 [pid = 3752] [id = 142] 03:24:27 INFO - PROCESS | 3752 | ++DOMWINDOW == 94 (0F9C8400) [pid = 3752] [serial = 425] [outer = 00000000] 03:24:27 INFO - PROCESS | 3752 | ++DOMWINDOW == 95 (112E9C00) [pid = 3752] [serial = 426] [outer = 0F9C8400] 03:24:27 INFO - PROCESS | 3752 | 1483615467178 Marionette DEBUG loaded listener.js 03:24:27 INFO - PROCESS | 3752 | ++DOMWINDOW == 96 (112E4C00) [pid = 3752] [serial = 427] [outer = 0F9C8400] 03:24:27 INFO - PROCESS | 3752 | 1483615467671 Marionette TRACE conn4 <- [1,528,null,{"value":["/XMLHttpRequest/open-url-base-inserted-after-open.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - insert after open()",0,null,null]]]}] 03:24:27 INFO - . 03:24:27 INFO - TEST-OK | /XMLHttpRequest/open-url-base-inserted-after-open.htm | took 997ms 03:24:27 INFO - PROCESS | 3752 | 1483615467743 Marionette TRACE conn4 -> [0,529,"getWindowHandle",null] 03:24:27 INFO - PROCESS | 3752 | 1483615467747 Marionette TRACE conn4 <- [1,529,null,{"value":"12"}] 03:24:27 INFO - TEST-START | /XMLHttpRequest/open-url-base-inserted.htm 03:24:27 INFO - PROCESS | 3752 | 1483615467753 Marionette TRACE conn4 -> [0,530,"timeouts",{"script":35000}] 03:24:27 INFO - PROCESS | 3752 | 1483615467759 Marionette TRACE conn4 <- [1,530,null,{}] 03:24:27 INFO - PROCESS | 3752 | 1483615467764 Marionette TRACE conn4 -> [0,531,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:27 INFO - PROCESS | 3752 | 1483615467955 Marionette TRACE conn4 <- [1,531,null,{"value":null}] 03:24:28 INFO - PROCESS | 3752 | 1483615468049 Marionette TRACE conn4 -> [0,532,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-base-inserted.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-base-inserted.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:28 INFO - PROCESS | 3752 | ++DOCSHELL 1216C800 == 36 [pid = 3752] [id = 143] 03:24:28 INFO - PROCESS | 3752 | ++DOMWINDOW == 97 (122E5000) [pid = 3752] [serial = 428] [outer = 00000000] 03:24:28 INFO - PROCESS | 3752 | ++DOMWINDOW == 98 (14BB8800) [pid = 3752] [serial = 429] [outer = 122E5000] 03:24:28 INFO - PROCESS | 3752 | 1483615468118 Marionette DEBUG loaded listener.js 03:24:28 INFO - PROCESS | 3752 | ++DOMWINDOW == 99 (14B65800) [pid = 3752] [serial = 430] [outer = 122E5000] 03:24:28 INFO - PROCESS | 3752 | 1483615468595 Marionette TRACE conn4 <- [1,532,null,{"value":["/XMLHttpRequest/open-url-base-inserted.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - insert ",0,null,null]]]}] 03:24:28 INFO - . 03:24:28 INFO - TEST-OK | /XMLHttpRequest/open-url-base-inserted.htm | took 904ms 03:24:28 INFO - PROCESS | 3752 | 1483615468659 Marionette TRACE conn4 -> [0,533,"getWindowHandle",null] 03:24:28 INFO - PROCESS | 3752 | 1483615468664 Marionette TRACE conn4 <- [1,533,null,{"value":"12"}] 03:24:28 INFO - TEST-START | /XMLHttpRequest/open-url-base.htm 03:24:28 INFO - PROCESS | 3752 | 1483615468669 Marionette TRACE conn4 -> [0,534,"timeouts",{"script":35000}] 03:24:28 INFO - PROCESS | 3752 | 1483615468672 Marionette TRACE conn4 <- [1,534,null,{}] 03:24:28 INFO - PROCESS | 3752 | 1483615468718 Marionette TRACE conn4 -> [0,535,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:28 INFO - PROCESS | 3752 | 1483615468862 Marionette TRACE conn4 <- [1,535,null,{"value":null}] 03:24:28 INFO - PROCESS | 3752 | 1483615468957 Marionette TRACE conn4 -> [0,536,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-base.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-base.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:28 INFO - PROCESS | 3752 | ++DOCSHELL 157D6C00 == 37 [pid = 3752] [id = 144] 03:24:28 INFO - PROCESS | 3752 | ++DOMWINDOW == 100 (15DDFC00) [pid = 3752] [serial = 431] [outer = 00000000] 03:24:29 INFO - PROCESS | 3752 | ++DOMWINDOW == 101 (168B0000) [pid = 3752] [serial = 432] [outer = 15DDFC00] 03:24:29 INFO - PROCESS | 3752 | 1483615469021 Marionette DEBUG loaded listener.js 03:24:29 INFO - PROCESS | 3752 | ++DOMWINDOW == 102 (16783C00) [pid = 3752] [serial = 433] [outer = 15DDFC00] 03:24:29 INFO - PROCESS | 3752 | 1483615469534 Marionette TRACE conn4 <- [1,536,null,{"value":["/XMLHttpRequest/open-url-base.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - ",0,null,null]]]}] 03:24:29 INFO - . 03:24:29 INFO - TEST-OK | /XMLHttpRequest/open-url-base.htm | took 888ms 03:24:29 INFO - PROCESS | 3752 | 1483615469571 Marionette TRACE conn4 -> [0,537,"getWindowHandle",null] 03:24:29 INFO - PROCESS | 3752 | 1483615469574 Marionette TRACE conn4 <- [1,537,null,{"value":"12"}] 03:24:29 INFO - TEST-START | /XMLHttpRequest/open-url-bogus.htm 03:24:29 INFO - PROCESS | 3752 | 1483615469712 Marionette TRACE conn4 -> [0,538,"timeouts",{"script":35000}] 03:24:29 INFO - PROCESS | 3752 | 1483615469716 Marionette TRACE conn4 <- [1,538,null,{}] 03:24:29 INFO - PROCESS | 3752 | 1483615469728 Marionette TRACE conn4 -> [0,539,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:29 INFO - PROCESS | 3752 | 1483615469920 Marionette TRACE conn4 <- [1,539,null,{"value":null}] 03:24:29 INFO - PROCESS | 3752 | 1483615469932 Marionette TRACE conn4 -> [0,540,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-bogus.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:29 INFO - PROCESS | 3752 | ++DOCSHELL 112ED800 == 38 [pid = 3752] [id = 145] 03:24:29 INFO - PROCESS | 3752 | ++DOMWINDOW == 103 (116E2C00) [pid = 3752] [serial = 434] [outer = 00000000] 03:24:29 INFO - PROCESS | 3752 | ++DOMWINDOW == 104 (122E3C00) [pid = 3752] [serial = 435] [outer = 116E2C00] 03:24:30 INFO - PROCESS | 3752 | 1483615469992 Marionette DEBUG loaded listener.js 03:24:30 INFO - PROCESS | 3752 | ++DOMWINDOW == 105 (1216C400) [pid = 3752] [serial = 436] [outer = 116E2C00] 03:24:30 INFO - PROCESS | 3752 | --DOCSHELL 153DA800 == 37 [pid = 3752] [id = 141] 03:24:30 INFO - PROCESS | 3752 | --DOCSHELL 12160800 == 36 [pid = 3752] [id = 140] 03:24:30 INFO - PROCESS | 3752 | --DOCSHELL 1A698800 == 35 [pid = 3752] [id = 139] 03:24:30 INFO - PROCESS | 3752 | --DOCSHELL 16986000 == 34 [pid = 3752] [id = 138] 03:24:30 INFO - PROCESS | 3752 | --DOCSHELL 186E9400 == 33 [pid = 3752] [id = 137] 03:24:30 INFO - PROCESS | 3752 | --DOCSHELL 194C5000 == 32 [pid = 3752] [id = 136] 03:24:30 INFO - PROCESS | 3752 | --DOCSHELL 17C9BC00 == 31 [pid = 3752] [id = 135] 03:24:30 INFO - PROCESS | 3752 | --DOCSHELL 16321800 == 30 [pid = 3752] [id = 134] 03:24:30 INFO - PROCESS | 3752 | --DOCSHELL 1441FC00 == 29 [pid = 3752] [id = 133] 03:24:30 INFO - PROCESS | 3752 | --DOCSHELL 11E61C00 == 28 [pid = 3752] [id = 132] 03:24:30 INFO - PROCESS | 3752 | --DOCSHELL 0F697000 == 27 [pid = 3752] [id = 131] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 104 (188F5400) [pid = 3752] [serial = 317] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 103 (194C2800) [pid = 3752] [serial = 367] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 102 (18694800) [pid = 3752] [serial = 359] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 101 (194C3C00) [pid = 3752] [serial = 368] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 100 (13FE8000) [pid = 3752] [serial = 350] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 99 (184BB400) [pid = 3752] [serial = 344] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 98 (1A2E6400) [pid = 3752] [serial = 374] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 97 (1A69A800) [pid = 3752] [serial = 377] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 96 (1735AC00) [pid = 3752] [serial = 338] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 95 (19223800) [pid = 3752] [serial = 364] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 94 (17AE6000) [pid = 3752] [serial = 341] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 93 (1110BC00) [pid = 3752] [serial = 347] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 92 (168BC800) [pid = 3752] [serial = 353] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 91 (16786400) [pid = 3752] [serial = 335] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 90 (1A2E7000) [pid = 3752] [serial = 373] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 89 (19AC0400) [pid = 3752] [serial = 370] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 88 (19ABF800) [pid = 3752] [serial = 371] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 87 (160D8C00) [pid = 3752] [serial = 329] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 86 (140C3400) [pid = 3752] [serial = 332] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 85 (17C9DC00) [pid = 3752] [serial = 356] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 84 (189D9400) [pid = 3752] [serial = 361] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 83 (19221400) [pid = 3752] [serial = 365] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 82 (189D6800) [pid = 3752] [serial = 362] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 81 (1A699400) [pid = 3752] [serial = 376] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 80 (18696400) [pid = 3752] [serial = 358] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 79 (17CA5000) [pid = 3752] [serial = 355] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 78 (16D03C00) [pid = 3752] [serial = 352] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 77 (13FEE000) [pid = 3752] [serial = 349] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 76 (11294000) [pid = 3752] [serial = 346] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 75 (184C2800) [pid = 3752] [serial = 343] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 74 (1843A000) [pid = 3752] [serial = 340] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 73 (17350000) [pid = 3752] [serial = 337] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 72 (1682E000) [pid = 3752] [serial = 334] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 71 (13FEEC00) [pid = 3752] [serial = 331] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | --DOMWINDOW == 70 (160DB800) [pid = 3752] [serial = 328] [outer = 00000000] [url = about:blank] 03:24:30 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x804B000A: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/netwerk/base/nsIOService.cpp, line 783 03:24:30 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x804B000A: file c:\builds\moz2_slave\m-beta-w32-d-00000000000000000\build\src\netwerk\base\nsNetUtilInlines.h, line 180 03:24:30 INFO - PROCESS | 3752 | [3752] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x804B000A: file c:/builds/moz2_slave/m-beta-w32-d-00000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 2430 03:24:30 INFO - PROCESS | 3752 | 1483615470548 Marionette TRACE conn4 <- [1,540,null,{"value":["/XMLHttpRequest/open-url-bogus.htm",0,null,null,[["XMLHttpRequest: open() - bogus URLs (//[)",0,null,null],["XMLHttpRequest: open() - bogus URLs (ftp:)",1,"assert_throws: function \"function () { client.open(\"GET\", url) }\" did not throw","url/<@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:15:11\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nurl@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:13:9\n@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:19:7\n"],["XMLHttpRequest: open() - bogus URLs (http://a a/)",0,null,null],["XMLHttpRequest: open() - bogus URLs (http:////////////)",1,"assert_throws: function \"function () { client.open(\"GET\", url) }\" did not throw","url/<@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:15:11\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1403:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nurl@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:13:9\n@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:21:7\n"],["XMLHttpRequest: open() - bogus URLs (http://u:p@/)",0,null,null]]]}] 03:24:30 INFO - ..... 03:24:30 INFO - TEST-OK | /XMLHttpRequest/open-url-bogus.htm | took 982ms 03:24:30 INFO - PROCESS | 3752 | 1483615470564 Marionette TRACE conn4 -> [0,541,"getWindowHandle",null] 03:24:30 INFO - PROCESS | 3752 | 1483615470568 Marionette TRACE conn4 <- [1,541,null,{"value":"12"}] 03:24:30 INFO - TEST-START | /XMLHttpRequest/open-url-encoding.htm 03:24:30 INFO - PROCESS | 3752 | 1483615470574 Marionette TRACE conn4 -> [0,542,"timeouts",{"script":35000}] 03:24:30 INFO - PROCESS | 3752 | 1483615470577 Marionette TRACE conn4 <- [1,542,null,{}] 03:24:30 INFO - PROCESS | 3752 | 1483615470584 Marionette TRACE conn4 -> [0,543,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:30 INFO - PROCESS | 3752 | 1483615470685 Marionette TRACE conn4 <- [1,543,null,{"value":null}] 03:24:30 INFO - PROCESS | 3752 | 1483615470693 Marionette TRACE conn4 -> [0,544,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-encoding.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-encoding.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:30 INFO - PROCESS | 3752 | ++DOCSHELL 1215EC00 == 28 [pid = 3752] [id = 146] 03:24:30 INFO - PROCESS | 3752 | ++DOMWINDOW == 71 (12160800) [pid = 3752] [serial = 437] [outer = 00000000] 03:24:30 INFO - PROCESS | 3752 | ++DOMWINDOW == 72 (12DE5C00) [pid = 3752] [serial = 438] [outer = 12160800] 03:24:30 INFO - PROCESS | 3752 | 1483615470750 Marionette DEBUG loaded listener.js 03:24:30 INFO - PROCESS | 3752 | ++DOMWINDOW == 73 (12DE3800) [pid = 3752] [serial = 439] [outer = 12160800] 03:24:31 INFO - PROCESS | 3752 | [3752] WARNING: String ending in half a surrogate pair!: file c:\builds\moz2_slave\m-beta-w32-d-00000000000000000\build\src\xpcom\string\nsUTF8Utils.h, line 593 03:24:31 INFO - PROCESS | 3752 | [3752] WARNING: String ending in half a surrogate pair!: file c:\builds\moz2_slave\m-beta-w32-d-00000000000000000\build\src\xpcom\string\nsUTF8Utils.h, line 494 03:24:31 INFO - PROCESS | 3752 | 1483615471143 Marionette TRACE conn4 <- [1,544,null,{"value":["/XMLHttpRequest/open-url-encoding.htm",0,null,null,[["percent encode characters",0,null,null],["lone surrogate should return U+FFFD",0,null,null]]]}] 03:24:31 INFO - .. 03:24:31 INFO - TEST-OK | /XMLHttpRequest/open-url-encoding.htm | took 593ms 03:24:31 INFO - PROCESS | 3752 | 1483615471170 Marionette TRACE conn4 -> [0,545,"getWindowHandle",null] 03:24:31 INFO - PROCESS | 3752 | 1483615471173 Marionette TRACE conn4 <- [1,545,null,{"value":"12"}] 03:24:31 INFO - TEST-START | /XMLHttpRequest/open-url-fragment.htm 03:24:31 INFO - PROCESS | 3752 | 1483615471177 Marionette TRACE conn4 -> [0,546,"timeouts",{"script":35000}] 03:24:31 INFO - PROCESS | 3752 | 1483615471180 Marionette TRACE conn4 <- [1,546,null,{}] 03:24:31 INFO - PROCESS | 3752 | 1483615471184 Marionette TRACE conn4 -> [0,547,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:31 INFO - PROCESS | 3752 | 1483615471282 Marionette TRACE conn4 <- [1,547,null,{"value":null}] 03:24:31 INFO - PROCESS | 3752 | 1483615471292 Marionette TRACE conn4 -> [0,548,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-fragment.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-fragment.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:31 INFO - PROCESS | 3752 | ++DOCSHELL 14B67000 == 29 [pid = 3752] [id = 147] 03:24:31 INFO - PROCESS | 3752 | ++DOMWINDOW == 74 (14B67800) [pid = 3752] [serial = 440] [outer = 00000000] 03:24:31 INFO - PROCESS | 3752 | ++DOMWINDOW == 75 (153D9800) [pid = 3752] [serial = 441] [outer = 14B67800] 03:24:31 INFO - PROCESS | 3752 | 1483615471354 Marionette DEBUG loaded listener.js 03:24:31 INFO - PROCESS | 3752 | ++DOMWINDOW == 76 (153D8000) [pid = 3752] [serial = 442] [outer = 14B67800] 03:24:31 INFO - PROCESS | 3752 | 1483615471738 Marionette TRACE conn4 <- [1,548,null,{"value":["/XMLHttpRequest/open-url-fragment.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - fragment identifier",0,null,null],["make sure fragment is removed from URL before request",0,null,null],["make sure fragment is removed from URL before request (with query string)",0,null,null],["make sure escaped # is not removed",0,null,null]]]}] 03:24:31 INFO - .... 03:24:31 INFO - TEST-OK | /XMLHttpRequest/open-url-fragment.htm | took 592ms 03:24:31 INFO - TEST-START | /XMLHttpRequest/open-url-javascript-window-2.htm 03:24:31 INFO - PROCESS | 3752 | 1483615471778 Marionette TRACE conn4 -> [0,549,"getWindowHandle",null] 03:24:31 INFO - PROCESS | 3752 | 1483615471781 Marionette TRACE conn4 <- [1,549,null,{"value":"12"}] 03:24:31 INFO - PROCESS | 3752 | 1483615471784 Marionette TRACE conn4 -> [0,550,"timeouts",{"script":35000}] 03:24:31 INFO - PROCESS | 3752 | 1483615471787 Marionette TRACE conn4 <- [1,550,null,{}] 03:24:31 INFO - PROCESS | 3752 | 1483615471791 Marionette TRACE conn4 -> [0,551,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":396}] 03:24:31 INFO - PROCESS | 3752 | 1483615471890 Marionette TRACE conn4 <- [1,551,null,{"value":null}] 03:24:31 INFO - PROCESS | 3752 | 1483615471896 Marionette TRACE conn4 -> [0,552,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-javascript-window-2.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-javascript-window-2.htm\", \"a096c472-d9eb-4f47-b6b0-0c3035440d6d\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":410,"args":[],"filename":"executormarionette.py"}] 03:24:31 INFO - PROCESS | 3752 | ++DOCSHELL 160DB400 == 30 [pid = 3752] [id = 148] 03:24:31 INFO - PROCESS | 3752 | ++DOMWINDOW == 77 (16111400) [pid = 3752] [serial = 443] [outer = 00000000] 03:24:31 INFO - PROCESS | 3752 | ++DOMWINDOW == 78 (16786400) [pid = 3752] [serial = 444] [outer = 16111400] 03:24:31 INFO - PROCESS | 3752 | 1483615471952 Marionette DEBUG loaded listener.js 03:24:32 INFO - PROCESS | 3752 | ++DOMWINDOW == 79 (16321800) [pid = 3752] [serial = 445] [outer = 16111400] 03:24:32 INFO - PROCESS | 3752 | ++DOCSHELL 160D2800 == 31 [pid = 3752] [id = 149] 03:24:32 INFO - PROCESS | 3752 | ++DOMWINDOW == 80 (16F06000) [pid = 3752] [serial = 446] [outer = 00000000] 03:24:32 INFO - PROCESS | 3752 | ++DOMWINDOW == 81 (16F06400) [pid = 3752] [serial = 447] [outer = 16F06000] 03:24:32 INFO - PROCESS | 3752 | 1483615472392 Marionette TRACE conn4 <- [1,552,null,{"value":["/XMLHttpRequest/open-url-javascript-window-2.htm",0,null,null,[["XMLHttpRequest: open() - resolving URLs (javascript: